US20050149204A1 - Configuring network settings using portable storage media - Google Patents
Configuring network settings using portable storage media Download PDFInfo
- Publication number
- US20050149204A1 US20050149204A1 US10/806,369 US80636904A US2005149204A1 US 20050149204 A1 US20050149204 A1 US 20050149204A1 US 80636904 A US80636904 A US 80636904A US 2005149204 A1 US2005149204 A1 US 2005149204A1
- Authority
- US
- United States
- Prior art keywords
- network
- configuration
- settings
- readable media
- media device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/084—Configuration by using pre-existing information, e.g. using templates or copying from other elements
- H04L41/0843—Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/065—Continuous authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/18—Negotiating wireless communication parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0879—Manual configuration through operator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Definitions
- This invention pertains generally to the field of computer networks and more particularly to a mechanism for simplifying the process of configuring nodes in computer networks.
- LANs local area networks
- WANs wide area networks
- Wired networks are being increasingly employed.
- the use of network technology in the home, both wired and wireless, is a more recent phenomenon and has been slower to develop.
- home networking permits personal computing devices and various consumer electronic devices and appliances within the home to communicate with each other.
- Wireless technology such as IEEE 802.11 wireless networks and networks of Bluetooth-enabled devices, is attractive in home as well as corporate environments for reasons of convenience, mobility and flexibility.
- a principal impediment to the wider adoption of networking technology in the home and other non-corporate environments has been the difficulty experienced by non-expert users in configuring network devices. For example, it can be troublesome for such users to configure a device to function as a wireless access point (WAP).
- WAP wireless access point
- Setting up an ad hoc wireless network of peer devices is also typically a complex task.
- Each peer device must have the same network settings, and a secure ad hoc network typically requires each peer device to have a common WEP key, which must be communicated to the user of the peer device and entered manually.
- Thin client devices such as digital audio receivers and wireless printers, which comprise an increasing number of home network devices, are particularly laborious to configure for network connectivity because they lack the convenient and intuitive I/O capabilities of conventional personal computers.
- a portable computer-readable media device is used to configure network devices to allow network functionality and connectivity.
- a configuration application generates, or aids the user in generating, network settings such as wireless configuration settings, LAN settings, and WAN settings. These settings are determined from the operating system or through user input.
- the configuration application then generates an Extensible Markup Language (XML) file embodying the network settings and writes that file to the portable computer-readable media device.
- XML Extensible Markup Language
- a user may then install the portable computer-readable media device in one or more other network devices to automatically transfer the configuration to those network devices.
- a wireless device may be provisioned with the wireless configuration settings necessary to join a wireless network, without requiring the user to manually enter the network settings.
- a method of provisioning a network device with network settings comprises the steps of determining a network settings configuration for allowing the network device to join a network, wherein the network settings configuration includes at least a network name and a network encryption key; generating an XML file including the network settings configuration; and writing the XML file to a portable computer-readable media device.
- the network encryption key is automatically generated so that a user does not have to enter a lengthy encryption key manually through a user interface.
- the network settings configuration is determined in an embodiment of the invention by collecting data from a user through a user interface.
- the network settings configuration is determined at least in part by using an application program interface (API) of an operating system to determine network settings such as wireless configuration, LAN settings, and Internet Protocol (IP) settings.
- API application program interface
- IP Internet Protocol
- data stored on a portable computer-readable media device for provisioning a device with network settings comprises an XML file containing a network settings configuration for configuring the device to join a network, and an autorun file for prompting the device to apply the network settings configuration.
- the network settings include at least one of (1) wireless configuration settings, (2) LAN settings, (3) WAN settings, and (4) broadband modem settings.
- the data stored on the portable computer-readable media device can also include multiple versions of the network settings configuration, corresponding to different networks.
- the data stored on the portable computer-readable media device can include a device configuration file describing configured devices.
- the data stored on the portable computer-readable media device further includes an application for configuring the portable computer-readable media device, wherein the application executes on a computer to which the portable computer-readable media device is connected.
- a method of configuring a device for operation in a network comprises detecting the installation of a portable computer-readable media device; uploading a configuration from the portable computer-readable media device, wherein the configuration includes network settings, device configuration information, security information, and file sharing information; applying the configuration; and joining the network.
- the configuration is again embodied in an XML file stored on the portable computer-readable media device.
- FIG. 1 is a simplified schematic diagram illustrating an exemplary architecture of a computing device for carrying out the configuration of a computer network in accordance with an embodiment of the invention
- FIG. 2 is a diagram illustrating an arrangement of computing devices for carrying out the configuration of a computer network in accordance with an embodiment of the invention
- FIG. 3 is a simplified schematic illustrating a software architecture for carrying out the configuration of a computer network in accordance with an embodiment of the invention
- FIG. 4 is a flow diagram illustrating a method of generating network settings and storing the settings to a portable media device in accordance with an embodiment of the invention
- FIGS. 5 A-J are screenshots of a wizard application for generating network settings and storing the settings to a portable media device in accordance with an embodiment of the invention
- FIG. 6 is a flow diagram illustrating a method of generating wireless network settings and storing the network settings on a portable media device
- FIG. 7 is a flow diagram illustrating a method of generating local area network settings and storing the network settings on a portable media device
- FIG. 8 is a flow diagram illustrating a method of generating wide area network settings and storing the network settings on a portable media device
- FIG. 9 is a flow diagram illustrating a method of generating broadband modem settings and storing the network settings on a portable media device
- FIG. 10 is a flow diagram illustrating a method uploading network settings from a portable media device
- FIG. 11 is a data structure diagram representing wireless network configuration settings in accordance with an embodiment of the invention.
- FIG. 12 is a data structure diagram representing LAN configuration settings in accordance with an embodiment of the invention.
- FIG. 13 is a data structure diagram representing WAN configuration settings in accordance with an embodiment of the invention.
- FIG. 14 is a data structure diagram representing broadband modem settings in accordance with an embodiment of the invention.
- FIG. 15 is a data structure diagram representing device configuration settings in accordance with an embodiment of the invention.
- the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote memory storage devices.
- the term computer system may be used to refer to a system of computers such as may be found in a distributed computing environment.
- FIG. 1 illustrates an example of a suitable computing system environment 100 in which the invention may be implemented.
- the computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment 100 .
- at least one embodiment of the invention does include each component illustrated in the exemplary operating environment 100
- another more typical embodiment of the invention excludes some or all non-essential components, for example, input/output devices other than those required for network communications.
- an exemplary system for implementing the invention includes a general purpose computing device in the form of a computer 110 .
- Components of the computer 110 may include, but are not limited to, a processing unit 120 , a system memory 130 , and a system bus 121 that couples various system components including the system memory to the processing unit 120 .
- the system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- the computer 110 typically includes a variety of computer-readable media.
- Computer-readable media can be any available media that can be accessed by the computer 110 and includes both volatile and nonvolatile media, and removable and nonremovable media.
- Computer-readable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and nonvolatile, removable and nonremovable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 110 .
- Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above are included within the scope of computer-readable media.
- the system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132 .
- ROM read only memory
- RAM random access memory
- FIG. 1 illustrates operating system 134 , application programs 135 , other program modules 136 and program data 137 .
- the computer 110 may also include other removable and nonremovable, volatile and nonvolatile computer storage media.
- FIG. 1 illustrates a hard disk drive 141 that reads from or writes to nonremovable, nonvolatile magnetic media, a magnetic disk drive 151 that reads from or writes to a removable, nonvolatile magnetic disk 152 , and an optical disk drive 155 that reads from or writes to a removable, nonvolatile optical disk 156 such as a CDROM.
- Other computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, DVDs, digital video tape, solid state RAM, solid state ROM, and the like.
- the hard disk drive 141 is typically connected to the system bus 121 through a nonremovable memory interface such as interface 140 , and magnetic disk drive 151 and optical disk drive 155 are typically connected to the system bus 121 by a removable memory interface, such as interface 150 .
- hard disk drive 141 is illustrated as storing operating system 144 , application programs 145 , other program modules 146 and program data 147 . Note that these components can either be the same as or different from operating system 134 , application programs 135 , other program modules 136 , and program data 137 . Operating system 144 , application programs 145 , other program modules 146 , and program data 147 are given different numbers herein to illustrate that, at a minimum, they are different copies.
- a user may enter commands and information into the computer 110 through input devices such as a tablet, or electronic digitizer, 164 , a microphone 163 , a keyboard 162 and pointing device 161 , commonly referred to as a mouse, trackball or touch pad.
- input devices such as a tablet, or electronic digitizer, 164 , a microphone 163 , a keyboard 162 and pointing device 161 , commonly referred to as a mouse, trackball or touch pad.
- These and other input devices are often connected to the processing unit 120 through a user input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB).
- a monitor 191 or other type of display device is also connected to the system bus 121 by way of an interface, such as a video interface 190 .
- the monitor 191 may also be integrated with a touch-screen panel or the like.
- monitor and/or touch screen panel can be physically coupled to a housing in which the computing device 110 is incorporated, such as in a tablet-type personal computer.
- computers such as the computing device 110 may also include other peripheral output devices such as speakers 197 and printer 196 , which may be connected through an output peripheral interface 194 or the like.
- the computer 110 preferably operates or is adaptable to operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180 .
- the remote computer 180 may be a personal computer, a server, a router, a peer device or other network node, and typically includes some or all of the elements described above relative to the computer 110 , although only a memory storage device 181 has been illustrated in FIG. 1 .
- the logical connections depicted in FIG. 1 include a LAN 171 and a WAN 173 , but may also include other networks.
- the computer 110 may comprise the source machine from which data is being migrated, and the remote computer 180 may comprise the destination machine.
- source and destination machines need not be initially connected by a network or otherwise, but instead, data may be migrated by way of any media capable of being written by the source platform and read by the destination platform or platforms.
- a portable flash memory medium sometimes referred to as a memory “key” or memory “stick.”
- Other non-limiting examples will be given below.
- the computer 110 When used in a LAN environment, the computer 110 is connectable to the LAN 171 through a network interface or adapter 170 .
- the computer 110 may also include a modem 172 or other means for establishing communications over the WAN 173 .
- the modem 172 which may be internal or external, may be connected to the system bus 121 by way of the user input interface 160 or other appropriate mechanism.
- program modules depicted relative to the computer 110 may be stored in the remote memory storage device.
- FIG. 1 illustrates remote application programs 185 as residing on memory device 181 . It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- FIG. 2 a simple example of a computing environment usable in implementing an embodiment of the invention is depicted.
- a computer 200 communicates with a LAN 202 by way of a physical connection.
- the computer 200 communicates with the LAN 202 by way of WAN or other communications media.
- the computer 200 is not initially in communications with any other device or network at all.
- the computer 200 executes a program that generates network configuration settings. These settings are stored on a portable media device (PM) 204 , such as a USB flash drive, Memory Stick, CompactFlash card, SmartMedia card, or other storage device.
- PM portable media device
- the computer 200 may directly accept the PM 204 by way of a built-in USB port, but alternatively is connected to a peripheral device, such as a card reader, that accepts the PM 204 .
- the PM 204 is a Bluetooth device that communicates wirelessly with the computer 200 .
- the appropriate network configuration settings are transferred to those devices, enabling network communications over a LAN 202 , WAN 206 , WLAN 208 or other types of computer networks.
- Exemplary networkable devices accepting the PM 204 include other computers 210 physically connected to the LAN 202 . Although the other computers 210 are physically connected to the same LAN 202 , they generally cannot communicate with one another until their network settings are appropriately configured. By attaching the PM 204 , the appropriate network settings are transferred to the other computers 210 , allowing for network communication between them.
- a printer 212 accepting the PM 204 is configured for communications on the LAN 202 , and/or on a wireless network 203 , making the printer 212 accessible to the computer 200 and other devices on the LAN 202 and/or wireless network 203 .
- a networkable television 214 and networkable telephone 216 also accept the PM 204 and are thereby configured for communications on the LAN 202 and/or wireless network 203 .
- a wireless access point 218 accepts the PM 204 and is thus configured to allow communications between devices on the LAN 202 and other appropriately configured wireless devices. For example, if the computer 200 was equipped with wireless networking hardware, then it could connect to the LAN 202 by communicating wirelessly with the wireless access point 218 .
- a modem 220 and router 222 also accept the PM 204 and are thereby configured to allow communication between devices on the LAN 202 and devices connected to a WAN 206 or the Internet 224 .
- attaching the PM 204 allows for network configuration on devices such as modems 220 and routers 222 that typically do not contain input and output mechanisms such as keyboards and monitors.
- the PM 204 is also used to configure wireless networks.
- a notebook computer 230 and a tablet computer 232 each accept the PM 204 and are thus appropriately configured for wireless communications over an ad hoc wireless network 234 .
- Other computers 236 accepting the PM 204 are similarly configured to communicate over the ad hoc wireless network 234 .
- access to the ad hoc network is generally limited to those computers that can physically attach the PM 204 .
- a user would have to enter configuration settings—including the network name and any security keys—in order to access the wireless network 234 .
- the computer networks configured by the PM 204 can be peer-to-peer networks (e.g., unmanaged “workgroups” that do not require a dedicated server) or domain-based networks such as client-server networks.
- a Flash Config Wizard 302 is executed on a computer 300 and communicates with the computer through a wireless configuration application programming interface (API) 304 to generate wireless network configuration settings.
- API application programming interface
- the Flash Config Wizard 302 is a standalone application.
- the Flash Config Wizard 302 is integrated into a general network setup application.
- the Flash Config Wizard 302 outputs XML files to the computer through a wireless provisioning API 306 .
- the Flash Config Wizard 302 further outputs XML files to an attached portable media device, such as a USB flash drive 308 .
- the USB flash drive 308 stores files and applications for use in the network configuration process.
- An embodiment of the invention includes a network setup application 310 stored in the root of the USB Flash Drive 308 in order to facilitate the configuring of network settings on other devices.
- the network setup application is stored on the USB flash drive 308 by the Flash Config Wizard 302 .
- that device can run the network setup application 310 to load the relevant network settings from the USB flash drive 308 to the other device.
- the USB flash drive 308 further stores an autorun file 318 .
- the detection of the autorun file 318 automatically triggers the device to execute the network setup program 310 . In this way, no user intervention is required to transfer the network settings to the device after the USB flash drive 308 has been attached.
- the USB flash drive 308 also stores, in one embodiment, a Flash Config Wizard copy 320 .
- the Flash Config Wizard 320 is executed by the computer to allow for manual guidance in transferring and modifying the network configuration settings.
- USB flash drive 308 Also stored on the USB flash drive 308 are several XML files representing the generated network configuration settings. These files are stored in a folder named SMRTNKEYon the USB flash drive 308 .
- An LSETTING.XML file 312 contains settings for a LAN.
- An NSETTING.XML file 314 contains settings for a WAN.
- a WSETTING.XML file 316 contains settings for a wireless LAN.
- An MSETTINGS.XML file 313 contains settings for a broadband modem.
- These XML files are described in greater detail below.
- a single USB flash drive 308 can be used to configure a variety of devices (such as personal computers, routers, printers, PDAs, and WAPs) to communicate over a variety of types of networks.
- the network configuration files are in binary format instead of XML.
- the binaries are stored on the USB flash drive, either alone or with the XML files, allowing devices without XML parsers to read the network configuration settings
- Configurable device 330 must provide support for USB Host Port, USB Mass Storage Devices, file allocation table (FAT) 16/32 file systems, and must include an XML Parser. Additionally access points must support 104 bit wireless encryption protocol (WEP), Infrastructure mode, and IEEE 802.11b protocol.
- configurable device 330 includes a light emitting diode (LED) 334 that blinks three times after the network configuration files are downloaded from the USB flash drive 308 .
- the USB flash drive 308 includes an LED 325 the blinks three times after the files have been downloaded to the device 330 .
- the USB flash drive 308 is also used to store a device configuration file 311 for describing the configuration of a device to which the USB flash drive 308 has been attached.
- Configurable device 330 further includes a device configuration reporter 332 for generating the device configuration file 311 .
- Each device that is configured using the USB flash drive 308 generates an XML file describing the configuration of that device, and reports any fault conditions.
- the device then writes the device configuration file 311 to the USB flash drive 308 , which is next attached to a PC that uploads the device configuration file 311 .
- the PC uses the device configuration file, for example, in a diagnostic tool to determine why network configuration failed.
- the PC obtains a uniform resource locator (URL) of the device manufacturer from the device configuration file 311 , and uses the URL to download, through hyper text transfer protocol over secure socket layers (HHTPS), an encryption key to access the device.
- the device configuration file 311 is stored in the SMRTNKY folder in a subfolder having the same name as the device.
- the device configuration file 311 described in greater detail below, is named using the last eight bytes of the media access control (MAC) address of the device.
- MAC media access control
- a method for using a portable media device to generate and store network configuration settings is now described with reference to FIG. 4 .
- a user installs a portable media device into a computer at step 410 .
- An interactive configuration tool, or “Flash Config Wizard”, is then executed on the computer at step 415 .
- the Flash Config Wizard interacts with the user to generate a set of network settings at step 420 .
- These network settings include configuration data necessary for configuring the computer for use with a wireless network, LAN, WAN, or broadband modem.
- the settings are written to the portable media device at step 425 , and the user removes the portable media device at step 430 .
- the user installs the portable media device in a device that the user wishes to configure.
- the user removes the portable media device after successful configuration, as indicated by a blinking LED, at step 440 .
- the user repeats steps 435 and 440 for those devices.
- the user re-installs the portable media device in the computer executing the Flash Config Wizard at step 450 .
- the Flash Config Wizard uploads the device configuration(s) at step 455 .
- the Flash Config Wizard uses the device configuration(s) to perform a diagnostic assessment of any errors or faults that occurred in configuring the devices.
- the user prints a hard copy of the various network settings. By printing a hard copy, the user can more easily configure those network devices that do not accept the personal media device and therefore may need to be configured manually.
- Flash Config Wizard as used in an embodiment of the invention, is now described in greater detail with respect to the screenshots shown in FIGS. 5A-5J .
- FIGS. 5A-5J illustrate a program for setting up a wireless network
- a Flash Config Wizard is not limited by the invention to configuring wireless networks; other networks such as wired LANs can similarly be configured using the Flash Config Wizard, in an embodiment of the invention.
- FIG. 5A After an introductory screen shown in FIG. 5A , the user is prompted for a network name and is presented the option of manually or automatically generating a network key in FIG. 5B .
- FIG. 5C the user is prompted for a 5 or 10 character ASCn network key, or a 13 or 16 character hexadecimal network key.
- FIG. 5D shows an error screen that appears if the user enters an invalid key.
- the user is prompted to save the settings to a USB flash drive, or set up each device manually.
- the Wizard prompts the user to insert and identify a USB flash drive.
- the Wizard stores the generated network settings to the portable media device.
- the user is presented with another screen shown in FIG. 5H , prompting the user to remove the portable media device and plug it into all additional computers, printers, or other network devices that are to be in communication over the network.
- the user plugs the portable media device back into the computer and is presented with the screen in FIG. 51 notifying the user of successful configuration.
- the Wizard also presents the user with a “Print” button, allowing the user to print a hard copy of the network settings, which allows the user to manually configure those network devices that do not accept the portable media device or that cannot be automatically configured for the network.
- FIG. 5J depicts the screen shot presented to the user if the user elects to configure devices manually. The user is prompted to print the settings for manual configuration.
- FIG. 6 illustrates the operation of the Flash Config Wizard with respect to generating a wireless configuration.
- the Flash Config Wizard prompts the user for a network name.
- the Flash Config Wizard then gets the wireless configuration settings through a wireless configuration API at step 620 .
- the wireless configuration API is provided by the OS, such as WZCDLG.DLL in the Microsoft Windows® OS.
- the user manually enters the wireless configuration settings.
- the Flash Config Wizard generates an XML file containing the wireless configuration settings in accordance with a schema.
- the Flash Config Wizard transfers the XML file to a wireless provisioning API in the OS so that the host computer may be configured with the wireless settings at step 640 .
- the Flash Config Wizard also transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device at step 650 .
- the Flash Config Wizard uploads device configuration files from the portable media device at step 660 .
- the Flash Config Wizard analyzes the device configuration files to determine whether the wireless devices were successfully configured.
- FIG. 7 illustrates the operation of the Flash Config Wizard with respect to generating a LAN configuration.
- the Flash Config Wizard prompts the user to enter various LAN settings at step 710 . These settings include, for example, the workgroup name and IP settings. The settings are described in more detail below.
- the Flash Config Wizard acquires the LAN settings through an API provided by the OS.
- the Flash Config Wizard generates an XML file containing the LAN configuration settings in accordance with a schema.
- the Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device at step 730 .
- the Flash Config Wizard uploads device configuration files from the portable media device at step 740 .
- the Flash Config Wizard analyzes the device configuration files to determine whether the LAN devices were successfully configured.
- FIG. 8 illustrates the operation of the Flash Config Wizard with respect to generating a WAN configuration.
- the Flash Config Wizard prompts the user to enter various WAN settings at step 810 . These settings include, for example, the type of WAN and a domain name service (DNS) address. The settings are described in more detail below.
- the Flash Config Wizard acquires the WAN settings through an API provided by the OS.
- the Flash Config Wizard generates an XML file containing the WAN configuration settings in accordance with a schema.
- the Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device at step 830 .
- the Flash Config Wizard uploads device configuration files from the portable media device at step 840 .
- the Flash Config Wizard analyzes the device configuration files to determine whether the WAN devices were successfully configured.
- FIG. 9 illustrates the operation of the Flash Config Wizard with respect to generating a broadband modem configuration.
- the Flash Config Wizard prompts the user to enter various broadband modem settings at step 910 . These settings are provided by the user's Internet service provider (ISP) and include, for example, a username and password for broadband Internet access. The settings are described in more detail below.
- ISP Internet service provider
- the Flash Config Wizard acquires the LAN settings through an API provided by the OS.
- the Flash Config Wizard generates an XML file containing the broadband modem configuration settings in accordance with a schema.
- the Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device at step 930 .
- the Flash Config Wizard uploads device configuration files from the portable media device at step 940 .
- the Flash Config Wizard analyzes the device configuration files to determine whether the devices were successfully configured.
- FIG. 10 illustrates the operation of an exemplary device that is configured using a portable media device.
- a device detects a portable media device containing network configuration files in a device to be configured.
- the device uploads the relevant network configuration settings from the portable media device and is provisioned at step 1020 . If the device supports an automatic discovery protocol, such as UPnP, a computer on the network will immediately recognize the new device and be notified of its availability. In one embodiment, the uploading is performed automatically, without any user intervention.
- the device searches the stored XML files for the particular data fields it requires, and uploads the corresponding data from the portable media device. In this way, the device only reads data relevant to its operation.
- the device generates a device configuration file and transfers the file to the portable media device.
- the device configuration file includes, for example, the manufacturer and model of the devices, as well as network configuration settings. The device configuration file is explained in more detail below.
- a personal computer generates the network settings and device configuration files according to corresponding XML schemas.
- a personal computer generates network settings and device configuration files for multiple profiles. The files corresponding to each profile a stored in different profile folders on the portable media device. In this manner, a user may maintain configurations for both a home and an office network on the same portable media device.
- the network settings files include a time-to-live (TTL) setting, and devices configured using the portable media device are denied access to the network after the prescribed TTL has passed. In this way a device is granted only temporary access to the network.
- TTL field is used in conjunction with an authentication scheme, such as a thumbprint. In this way, authenticated devices are granted permanent access to the network while guests are granted only temporary access as determined by the TTL field.
- FIG. 11 illustrates a conceptualization of the wireless network settings file 1100 .
- Each element of file 1100 represents a wireless configuration setting.
- Service set identifier (SSID) 1110 is a 1-32 byte string representing the name of the wireless network. SSID 1110 can only occur once.
- Network Key 1115 is a string that the PC Will automatically generate, or alternatively, receive from the PC user. The Network Key 1115 is used for encryption on the wireless network.
- Authentication Type 1120 indicates the authentication protocol used by the wireless network. Authentication Type 1120 allows a range of possible values, including open, shared, WiFi Protected Access (WPA), WPA Pre-Shared Key (PSK), WPA-none, WPA2, or WPA2 PSK.
- WPA WiFi Protected Access
- PSK Pre-Shared Key
- Encryption Type 1125 indicates the encryption protocol used by the wireless network. Encryption Type 1125 allows a range of possible values, including none, Wireless Encryption Protocol (WEP), Temporal Key Integrity Protocol (TKIP), and Advanced Encryption Standard (AES).
- WEP Wireless Encryption Protocol
- TKIP Temporal Key Integrity Protocol
- AES Advanced Encryption Standard
- Type 1130 indicates a connection type, and may have as its value either extended service set (ESS) in the case of an ad hoc network, or infrastructure basic service set (IBSS) in the case of an infrastructure network.
- Key Index 1135 indicates the location of the specific key used to encrypt messages, and may have a value of 1, 2, 3, or 4. Key Index 1135 is used with WEP.
- Key Provided Info 1140 indicates whether a key is provided automatically, and can have a value of either 0 or 1.
- 802.1X 1145 indicates whether IEEE 802.1X protocol is used on the network, and can have a value of either 0 or 1.
- 2.4 GHz Channel 1150 indicates which 2.4 GHz Channel, if any, is being used by the wireless network, and can have a value in the range of 1 to 14.
- 5 GHz Channel 1155 indicates which 5 GHz channel, if any, is being used by the wireless network, and can have a value of 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, or 161
- WAP Mode 1160 indicates the mode in which the wireless access point is operating.
- WAP Mode 1160 can have a value of infrastructure, bridge, repeater, or station.
- EAP Method 1165 indicates the Extensible Authentication Protocol used, and may have a value of EAP-TLS, PEAP-EAP-MSCHAPv2, or PEAP-EAP-TLS. This setting is used for 802.1x authentication only.
- TTL 1170 indicates a time-to-live element for specifying the length of time a network key is valid.
- FIG. 12 illustrates a conceptualization of a WAN network settings file for WAN configurations.
- the WAN network settings file 1200 includes the following elements: DNS IP Auto Pushed 1212 , Clone MAC Address 1213 , MAC Address 1214 , DNS1 IP Address 1215 , DNS2 IP Address 1216 , connectionType 1217 , wanConnection 1218 , DHCP 1210 , Static IP 1220 , and PPPoE 1230 .
- DNS IP Auto Pushed 1212 indicates whether a domain name service IP address is automatically pushed to the DHCP client.
- Clone MAC Address 1213 indicates whether the MAC address of the client should be cloned for use in the WAN, and takes a value of 0 or 1.
- MAC Address 1214 defines the MAC address of the client.
- DNS1 IP Address 1215 and DNS2 IP Address 1216 define IP addresses for domain name servers.
- the connectionType element 1217 specifies whether the connection is via Point-to-Point Protocol over Ethernet (PPPoE) or IP.
- the PPPoE element 1230 further includes subelements Username 1231 , Password 1232 , Service Name 1233 , Max Idle Time 1234 , and Auto-Reconnect 1235 .
- Username 1231 defines a username for a device to be configured, and Password 1232 defines a password for a device to be configured.
- Service Name 1232 defines a string indicating the name of a PPPoE server.
- Max Idle Time 1234 defines a maximum idle time for the device to be configured.
- Auto-Reconnect 1235 indicates whether the device to be configured should automatically reconnect to the network, and takes a value of 0 or 1.
- the wanConnection 1218 element specifies whether the WAN connection is a DHCP connection or a static IP connection.
- DHCP element 1210 further includes subelement Hostname 1211 .
- Hostname 1211 defines a string signifying the name of the DHCP host.
- Static IP element 1220 further includes subelements IP Address 1221 , IP Subnet 1222 , IP Subnet Mask 1223 , DG 1224 , DNS1 IP Address 1225 , and DNS2 IP Address 1226 .
- IP Address 1221 defines the static IP address of the device to be configured.
- IP Subnet 1222 defines the IP subnet of the device to be configured.
- IP Subnet Mask 1223 defines the IP subnet mask of the device to be configured.
- DG 1224 defines the default gateway for the device to be configured.
- FIG. 13 illustrates a conceptualization of the LAN settings configuration file for LAN configuration.
- File 1300 includes the following elements: Workgroup Name 1310 , IP Settings 1320 , IP Subnet 1330 , Network Shares 1340 , Castle 1350 , and Domain Name 1360 .
- Workgroup Name 1310 defines a workgroup name for the LAN.
- IP Settings 1320 defines the IP settings for the LAN device.
- the IP Settings 1320 may include sub elements DHCP 1321 for defining DHCP settings and Static IP 1322 for defining settings using static IP addressing.
- IP Subnet 1330 defines an IP subnet for the device to be configured, wherein the IP subnet defined by IP Subnet 1330 may be different from the IP subnet defines in IP Settings 1320 .
- Network Shares 1340 defines the file sharing configuration for the LAN which the device to be configured is to join, including network drive mappings.
- Castle 1350 is a boolean element for indicating whether Castle-type service is enabled.
- Domain Name 1360 is a string for indicating the domain name for the LAN.
- FIG. 14 illustrates a conceptualization of the broadband modem settings configuration file for broadband modem configuration.
- the file 1400 includes the following elements: User Name 1410 , Password 1420 , DHCP 1430 , P Address 1440 , Connection Type 1450 , Link Modulation 1460 , ATM Encapsulation 1470 , and Link Type 1480 .
- User Name 1410 and Password 1420 indicate a user name and password for accessing the Internet through a broadband ISP.
- DHCP 1430 is a boolean element that indicates whether DHCP is used.
- IP Address 1440 indicates the IP address assigned to the modem.
- Connection Type 1450 indicates the type of connection, and may have as a value PPP, PPPoE, PPPoA, IPoA, EoA, Dial PPP, and CIP.
- Link Modulation 1460 indicate the modulation type, and may have as a value VDSL, SDSL, ADSLdmt, ADSLlite, IDSL, HDSL, QPSK, 16 QAM, 64 QAM, 256 QAM, Ethernet, Other, or POTS.
- ATM Encapsulation 1470 indicates whether ATM encapsulation is LLC or VCMUX.
- Link Type 1480 indicates whether the link is via DSL, Cable, Ethernet, or POTS.
- FIG. 15 illustrates a conceptualization of the device settings configuration file 1500 .
- File 1500 includes identification (ID) settings 1510 , network settings 1520 , and wireless settings 1530 for a device.
- ID settings 1510 relate to information regarding the manufacturer of the device, the manufacturer's web site, the model name of the device, the web site for the device model, the firmware version of the firmware in the device, the device's name, a description of the device, the status of the device, a workgroup name for the device, and a presentation URL.
- Network settings 1520 relate to information regarding the IPv4, IPv6, and MAC addresses of the device, the status of the network interface (e.g. active, no signal, authenticating, disabled), the type of media (e.g. 802.3, 1394, 802.11, USB, Bluetooth), the speed of the connection, and whether DHCP is enabled.
- Wireless settings 1530 relate to information regarding the wireless authentication protocols (e.g. open, shared, WPA-NONE, WPA, WPAPSK, WPA2, WPA2PSK) and the wireless encryption protocols (e.g. WEP, TKIP, AES) used by the device.
- Wireless settings 1530 further includes wireless settings profiles specific to the function of the device. If the device is a wireless client, wireless settings 1530 includes wi-fi client settings 1532 . These settings relate to information regarding the regulatory domain of the device, the transmission power of the device, and the network type (e.g. 802.11a/bg). If the device is a wireless infrastructure device, wireless settings 1530 includes wi-fi infrastructure settings 1534 .
- wireless settings 1530 includes WAP settings 1536 . These settings relate to information regarding the regulatory domain, MAC filter, beacon interval, and network type of the WAP.
Abstract
Description
- This patent application claims the benefit of U.S. Provisional Patent Application No. 60/534,795 file Jan. 7, 2004.
- This invention pertains generally to the field of computer networks and more particularly to a mechanism for simplifying the process of configuring nodes in computer networks.
- The use of data communication networks continues to grow. In small as well as large corporate settings, wired local area networks (LANs) and wide area networks (WANs) have become an established feature of conducting business, and wireless networks are being increasingly employed. The use of network technology in the home, both wired and wireless, is a more recent phenomenon and has been slower to develop. In addition to facilitating Internet connectivity, home networking permits personal computing devices and various consumer electronic devices and appliances within the home to communicate with each other. Wireless technology, such as IEEE 802.11 wireless networks and networks of Bluetooth-enabled devices, is attractive in home as well as corporate environments for reasons of convenience, mobility and flexibility.
- A principal impediment to the wider adoption of networking technology in the home and other non-corporate environments has been the difficulty experienced by non-expert users in configuring network devices. For example, it can be troublesome for such users to configure a device to function as a wireless access point (WAP). Setting up an ad hoc wireless network of peer devices (such as wireless PCs, wireless printers, and PDAs) is also typically a complex task. Each peer device must have the same network settings, and a secure ad hoc network typically requires each peer device to have a common WEP key, which must be communicated to the user of the peer device and entered manually. Thin client devices, such as digital audio receivers and wireless printers, which comprise an increasing number of home network devices, are particularly laborious to configure for network connectivity because they lack the convenient and intuitive I/O capabilities of conventional personal computers.
- In accordance with the invention, a portable computer-readable media device is used to configure network devices to allow network functionality and connectivity. In an embodiment of the invention, a configuration application generates, or aids the user in generating, network settings such as wireless configuration settings, LAN settings, and WAN settings. These settings are determined from the operating system or through user input. The configuration application then generates an Extensible Markup Language (XML) file embodying the network settings and writes that file to the portable computer-readable media device. A user may then install the portable computer-readable media device in one or more other network devices to automatically transfer the configuration to those network devices. In one exemplary embodiment of the invention, a wireless device may be provisioned with the wireless configuration settings necessary to join a wireless network, without requiring the user to manually enter the network settings.
- In a further embodiment of the invention, a method of provisioning a network device with network settings comprises the steps of determining a network settings configuration for allowing the network device to join a network, wherein the network settings configuration includes at least a network name and a network encryption key; generating an XML file including the network settings configuration; and writing the XML file to a portable computer-readable media device. In one permutation of this embodiment, the network encryption key is automatically generated so that a user does not have to enter a lengthy encryption key manually through a user interface.
- As noted above, the network settings configuration is determined in an embodiment of the invention by collecting data from a user through a user interface. In another embodiment of the invention, the network settings configuration is determined at least in part by using an application program interface (API) of an operating system to determine network settings such as wireless configuration, LAN settings, and Internet Protocol (IP) settings.
- In another embodiment of the invention, data stored on a portable computer-readable media device for provisioning a device with network settings comprises an XML file containing a network settings configuration for configuring the device to join a network, and an autorun file for prompting the device to apply the network settings configuration. In this embodiment, the network settings include at least one of (1) wireless configuration settings, (2) LAN settings, (3) WAN settings, and (4) broadband modem settings. The data stored on the portable computer-readable media device can also include multiple versions of the network settings configuration, corresponding to different networks. Still further, the data stored on the portable computer-readable media device can include a device configuration file describing configured devices.
- In keeping with the invention, the data stored on the portable computer-readable media device further includes an application for configuring the portable computer-readable media device, wherein the application executes on a computer to which the portable computer-readable media device is connected. In another embodiment of the invention, a method of configuring a device for operation in a network comprises detecting the installation of a portable computer-readable media device; uploading a configuration from the portable computer-readable media device, wherein the configuration includes network settings, device configuration information, security information, and file sharing information; applying the configuration; and joining the network. In this embodiment, the configuration is again embodied in an XML file stored on the portable computer-readable media device.
- Additional features and advantages of the invention will be apparent from the following detailed description of illustrative embodiments which proceeds with reference to the accompanying figures.
- While the appended claims set forth the features of the present invention with particularity, the invention and its advantages are best understood from the following detailed description taken in conjunction with the accompanying drawings, of which:
-
FIG. 1 is a simplified schematic diagram illustrating an exemplary architecture of a computing device for carrying out the configuration of a computer network in accordance with an embodiment of the invention; -
FIG. 2 is a diagram illustrating an arrangement of computing devices for carrying out the configuration of a computer network in accordance with an embodiment of the invention; -
FIG. 3 is a simplified schematic illustrating a software architecture for carrying out the configuration of a computer network in accordance with an embodiment of the invention; -
FIG. 4 is a flow diagram illustrating a method of generating network settings and storing the settings to a portable media device in accordance with an embodiment of the invention; - FIGS. 5A-J are screenshots of a wizard application for generating network settings and storing the settings to a portable media device in accordance with an embodiment of the invention;
-
FIG. 6 is a flow diagram illustrating a method of generating wireless network settings and storing the network settings on a portable media device; -
FIG. 7 is a flow diagram illustrating a method of generating local area network settings and storing the network settings on a portable media device; -
FIG. 8 is a flow diagram illustrating a method of generating wide area network settings and storing the network settings on a portable media device; -
FIG. 9 is a flow diagram illustrating a method of generating broadband modem settings and storing the network settings on a portable media device; -
FIG. 10 is a flow diagram illustrating a method uploading network settings from a portable media device; -
FIG. 11 is a data structure diagram representing wireless network configuration settings in accordance with an embodiment of the invention; -
FIG. 12 is a data structure diagram representing LAN configuration settings in accordance with an embodiment of the invention; -
FIG. 13 is a data structure diagram representing WAN configuration settings in accordance with an embodiment of the invention; -
FIG. 14 is a data structure diagram representing broadband modem settings in accordance with an embodiment of the invention; and -
FIG. 15 is a data structure diagram representing device configuration settings in accordance with an embodiment of the invention. - Methods and systems for configuring network devices with a portable media device will now be described with respect to certain embodiments. The skilled artisan will readily appreciate that the methods and systems described herein are merely exemplary and that variations can be made without departing from the spirit and scope of the invention.
- The present invention will be more completely understood through the following detailed description, which should be read in conjunction with the attached drawings. In this description, like numbers refer to similar elements within various embodiments of the present invention. The invention is illustrated as being implemented in a suitable computing environment. Although not required, the invention will be described in the general context of computer-executable instructions, such as procedures, being executed by a personal computer. Generally, procedures include program modules, routines, functions, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multi-processor systems, and microprocessor-based or programmable consumer electronics devices. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. The term computer system may be used to refer to a system of computers such as may be found in a distributed computing environment.
-
FIG. 1 illustrates an example of a suitablecomputing system environment 100 in which the invention may be implemented. Thecomputing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should thecomputing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in theexemplary operating environment 100. Although at least one embodiment of the invention does include each component illustrated in theexemplary operating environment 100, another more typical embodiment of the invention excludes some or all non-essential components, for example, input/output devices other than those required for network communications. - With reference to
FIG. 1 , an exemplary system for implementing the invention includes a general purpose computing device in the form of acomputer 110. Components of thecomputer 110 may include, but are not limited to, aprocessing unit 120, asystem memory 130, and asystem bus 121 that couples various system components including the system memory to theprocessing unit 120. Thesystem bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. - The
computer 110 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by thecomputer 110 and includes both volatile and nonvolatile media, and removable and nonremovable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and nonremovable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by thecomputer 110. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above are included within the scope of computer-readable media. - The
system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. By way of example, and not limitation,FIG. 1 illustratesoperating system 134,application programs 135,other program modules 136 andprogram data 137. - The
computer 110 may also include other removable and nonremovable, volatile and nonvolatile computer storage media. By way of example only,FIG. 1 illustrates ahard disk drive 141 that reads from or writes to nonremovable, nonvolatile magnetic media, amagnetic disk drive 151 that reads from or writes to a removable, nonvolatilemagnetic disk 152, and anoptical disk drive 155 that reads from or writes to a removable, nonvolatileoptical disk 156 such as a CDROM. Other computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, DVDs, digital video tape, solid state RAM, solid state ROM, and the like. Thehard disk drive 141 is typically connected to thesystem bus 121 through a nonremovable memory interface such asinterface 140, andmagnetic disk drive 151 andoptical disk drive 155 are typically connected to thesystem bus 121 by a removable memory interface, such asinterface 150. - The drives and their associated computer storage media, discussed above and illustrated in
FIG. 1 , provide storage of computer-readable instructions, data structures, program modules and other data for thecomputer 110. InFIG. 1 , for example,hard disk drive 141 is illustrated as storingoperating system 144,application programs 145,other program modules 146 andprogram data 147. Note that these components can either be the same as or different fromoperating system 134,application programs 135,other program modules 136, andprogram data 137.Operating system 144,application programs 145,other program modules 146, andprogram data 147 are given different numbers herein to illustrate that, at a minimum, they are different copies. A user may enter commands and information into thecomputer 110 through input devices such as a tablet, or electronic digitizer, 164, a microphone 163, akeyboard 162 andpointing device 161, commonly referred to as a mouse, trackball or touch pad. These and other input devices are often connected to theprocessing unit 120 through auser input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). Amonitor 191 or other type of display device is also connected to thesystem bus 121 by way of an interface, such as avideo interface 190. Themonitor 191 may also be integrated with a touch-screen panel or the like. Note that the monitor and/or touch screen panel can be physically coupled to a housing in which thecomputing device 110 is incorporated, such as in a tablet-type personal computer. In addition, computers such as thecomputing device 110 may also include other peripheral output devices such asspeakers 197 andprinter 196, which may be connected through an output peripheral interface 194 or the like. - The
computer 110 preferably operates or is adaptable to operate in a networked environment using logical connections to one or more remote computers, such as aremote computer 180. Theremote computer 180 may be a personal computer, a server, a router, a peer device or other network node, and typically includes some or all of the elements described above relative to thecomputer 110, although only amemory storage device 181 has been illustrated inFIG. 1 . The logical connections depicted inFIG. 1 include aLAN 171 and aWAN 173, but may also include other networks. For example, in the present invention, thecomputer 110 may comprise the source machine from which data is being migrated, and theremote computer 180 may comprise the destination machine. Note however that source and destination machines need not be initially connected by a network or otherwise, but instead, data may be migrated by way of any media capable of being written by the source platform and read by the destination platform or platforms. For example, one non-limiting instance of such a medium is a portable flash memory medium, sometimes referred to as a memory “key” or memory “stick.” Other non-limiting examples will be given below. - When used in a LAN environment, the
computer 110 is connectable to theLAN 171 through a network interface oradapter 170. Thecomputer 110 may also include amodem 172 or other means for establishing communications over theWAN 173. Themodem 172, which may be internal or external, may be connected to thesystem bus 121 by way of theuser input interface 160 or other appropriate mechanism. In a networked environment, program modules depicted relative to thecomputer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,FIG. 1 illustratesremote application programs 185 as residing onmemory device 181. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. - Turning to
FIG. 2 , a simple example of a computing environment usable in implementing an embodiment of the invention is depicted. In the example shown inFIG. 2 , acomputer 200 communicates with aLAN 202 by way of a physical connection. Alternatively, thecomputer 200 communicates with theLAN 202 by way of WAN or other communications media. In an embodiment of the invention, thecomputer 200 is not initially in communications with any other device or network at all. In an embodiment of the invention, thecomputer 200 executes a program that generates network configuration settings. These settings are stored on a portable media device (PM) 204, such as a USB flash drive, Memory Stick, CompactFlash card, SmartMedia card, or other storage device. Thecomputer 200 may directly accept thePM 204 by way of a built-in USB port, but alternatively is connected to a peripheral device, such as a card reader, that accepts thePM 204. In one embodiment, thePM 204 is a Bluetooth device that communicates wirelessly with thecomputer 200. - Once settings have been generated and stored on the PM, then, by attaching the
PM 204 to various networkable devices, the appropriate network configuration settings are transferred to those devices, enabling network communications over aLAN 202,WAN 206, WLAN 208 or other types of computer networks. Exemplary networkable devices accepting thePM 204 includeother computers 210 physically connected to theLAN 202. Although theother computers 210 are physically connected to thesame LAN 202, they generally cannot communicate with one another until their network settings are appropriately configured. By attaching thePM 204, the appropriate network settings are transferred to theother computers 210, allowing for network communication between them. Similarly, aprinter 212 accepting thePM 204 is configured for communications on theLAN 202, and/or on awireless network 203, making theprinter 212 accessible to thecomputer 200 and other devices on theLAN 202 and/orwireless network 203. Anetworkable television 214 andnetworkable telephone 216 also accept thePM 204 and are thereby configured for communications on theLAN 202 and/orwireless network 203. - Other network hardware is likewise configured for network communication by attaching the
PM 204. Awireless access point 218 accepts thePM 204 and is thus configured to allow communications between devices on theLAN 202 and other appropriately configured wireless devices. For example, if thecomputer 200 was equipped with wireless networking hardware, then it could connect to theLAN 202 by communicating wirelessly with thewireless access point 218. Amodem 220 androuter 222 also accept thePM 204 and are thereby configured to allow communication between devices on theLAN 202 and devices connected to aWAN 206 or the Internet 224. Notably, attaching thePM 204 allows for network configuration on devices such asmodems 220 androuters 222 that typically do not contain input and output mechanisms such as keyboards and monitors. - The
PM 204 is also used to configure wireless networks. For example, anotebook computer 230 and atablet computer 232 each accept thePM 204 and are thus appropriately configured for wireless communications over an ad hoc wireless network 234. Other computers 236 accepting thePM 204 are similarly configured to communicate over the ad hoc wireless network 234. In this way, access to the ad hoc network is generally limited to those computers that can physically attach thePM 204. Without thePM 204, a user would have to enter configuration settings—including the network name and any security keys—in order to access the wireless network 234. By attaching thePM 204, a computer is granted access to the wireless network 234 quickly and transparently. The computer networks configured by thePM 204 can be peer-to-peer networks (e.g., unmanaged “workgroups” that do not require a dedicated server) or domain-based networks such as client-server networks. - Turning attention to
FIG. 3 , a software architecture for generating and storing network configuration settings is now described, in accordance with an embodiment of the invention. AFlash Config Wizard 302 is executed on acomputer 300 and communicates with the computer through a wireless configuration application programming interface (API) 304 to generate wireless network configuration settings. In the Windows operating system environment, for example, the WZCDLG.DLL library can be used. In one embodiment, theFlash Config Wizard 302 is a standalone application. In another embodiment, theFlash Config Wizard 302 is integrated into a general network setup application. TheFlash Config Wizard 302 outputs XML files to the computer through awireless provisioning API 306. TheFlash Config Wizard 302 further outputs XML files to an attached portable media device, such as aUSB flash drive 308. TheUSB flash drive 308 stores files and applications for use in the network configuration process. An embodiment of the invention includes anetwork setup application 310 stored in the root of theUSB Flash Drive 308 in order to facilitate the configuring of network settings on other devices. The network setup application is stored on theUSB flash drive 308 by theFlash Config Wizard 302. When theUSB flash drive 308 is attached to another device, that device can run thenetwork setup application 310 to load the relevant network settings from theUSB flash drive 308 to the other device. - In an embodiment of the invention, the
USB flash drive 308 further stores anautorun file 318. When theUSB flash drive 308 is attached to a compatible device that recognizes the autorun file, the detection of theautorun file 318 automatically triggers the device to execute thenetwork setup program 310. In this way, no user intervention is required to transfer the network settings to the device after theUSB flash drive 308 has been attached. - The
USB flash drive 308 also stores, in one embodiment, a FlashConfig Wizard copy 320. When theUSB flash drive 308 is attached to another computer, theFlash Config Wizard 320 is executed by the computer to allow for manual guidance in transferring and modifying the network configuration settings. - Also stored on the
USB flash drive 308 are several XML files representing the generated network configuration settings. These files are stored in a folder named SMRTNKEYon theUSB flash drive 308. An LSETTING.XML file 312 contains settings for a LAN. An NSETTING.XML file 314 contains settings for a WAN. A WSETTING.XML file 316 contains settings for a wireless LAN. An MSETTINGS.XML file 313 contains settings for a broadband modem. These XML files are described in greater detail below. By storing these network configuration settings, a singleUSB flash drive 308 can be used to configure a variety of devices (such as personal computers, routers, printers, PDAs, and WAPs) to communicate over a variety of types of networks. In another embodiment of the invention, the network configuration files are in binary format instead of XML. The binaries are stored on the USB flash drive, either alone or with the XML files, allowing devices without XML parsers to read the network configuration settings. - After the network settings configuration files have been transferred to the
USB flash drive 308, theUSB flash drive 308 is installed in aconfigurable device 330.Configurable device 330 must provide support for USB Host Port, USB Mass Storage Devices, file allocation table (FAT) 16/32 file systems, and must include an XML Parser. Additionally access points must support 104 bit wireless encryption protocol (WEP), Infrastructure mode, and IEEE 802.11b protocol. In an embodiment of the invention,configurable device 330 includes a light emitting diode (LED) 334 that blinks three times after the network configuration files are downloaded from theUSB flash drive 308. In another embodiment of the invention, theUSB flash drive 308 includes anLED 325 the blinks three times after the files have been downloaded to thedevice 330. - In an embodiment of the invention, the
USB flash drive 308 is also used to store adevice configuration file 311 for describing the configuration of a device to which theUSB flash drive 308 has been attached.Configurable device 330 further includes adevice configuration reporter 332 for generating thedevice configuration file 311. Each device that is configured using theUSB flash drive 308 generates an XML file describing the configuration of that device, and reports any fault conditions. The device then writes thedevice configuration file 311 to theUSB flash drive 308, which is next attached to a PC that uploads thedevice configuration file 311. The PC uses the device configuration file, for example, in a diagnostic tool to determine why network configuration failed. In another example, the PC obtains a uniform resource locator (URL) of the device manufacturer from thedevice configuration file 311, and uses the URL to download, through hyper text transfer protocol over secure socket layers (HHTPS), an encryption key to access the device. Thedevice configuration file 311 is stored in the SMRTNKY folder in a subfolder having the same name as the device. Thedevice configuration file 311, described in greater detail below, is named using the last eight bytes of the media access control (MAC) address of the device. - A method for using a portable media device to generate and store network configuration settings, in accordance with an embodiment of the invention, is now described with reference to
FIG. 4 . A user installs a portable media device into a computer atstep 410. An interactive configuration tool, or “Flash Config Wizard”, is then executed on the computer atstep 415. The Flash Config Wizard interacts with the user to generate a set of network settings atstep 420. These network settings include configuration data necessary for configuring the computer for use with a wireless network, LAN, WAN, or broadband modem. The settings are written to the portable media device atstep 425, and the user removes the portable media device atstep 430. Atstep 435, the user installs the portable media device in a device that the user wishes to configure. The user removes the portable media device after successful configuration, as indicated by a blinking LED, atstep 440. Atstep 445, if there are more devices to be configured, the user repeatssteps step 450. The Flash Config Wizard uploads the device configuration(s) atstep 455. In an embodiment of the invention, the Flash Config Wizard uses the device configuration(s) to perform a diagnostic assessment of any errors or faults that occurred in configuring the devices. Atstep 460, the user prints a hard copy of the various network settings. By printing a hard copy, the user can more easily configure those network devices that do not accept the personal media device and therefore may need to be configured manually. - The Flash Config Wizard, as used in an embodiment of the invention, is now described in greater detail with respect to the screenshots shown in
FIGS. 5A-5J . Although the figures illustrate a program for setting up a wireless network, a Flash Config Wizard is not limited by the invention to configuring wireless networks; other networks such as wired LANs can similarly be configured using the Flash Config Wizard, in an embodiment of the invention. After an introductory screen shown inFIG. 5A , the user is prompted for a network name and is presented the option of manually or automatically generating a network key inFIG. 5B . In the screen shown inFIG. 5C , the user is prompted for a 5 or 10 character ASCn network key, or a 13 or 16 character hexadecimal network key. If the user selected Wi-Fi Protected Access (WPA) encryption in the previous screen, the user is prompted for a 8-63 character ASCII network key, or a 64 character hexadecimal network key, in the screen shown inFIG. 5D .FIG. 5E shows an error screen that appears if the user enters an invalid key. - In the screen shown in
FIG. 5F , the user is prompted to save the settings to a USB flash drive, or set up each device manually. In the screen shown inFIG. 5G , the Wizard prompts the user to insert and identify a USB flash drive. When the user clicks “Next” on this screen, the Wizard stores the generated network settings to the portable media device. When the network settings have been completely stored on the portable media device, the user is presented with another screen shown inFIG. 5H , prompting the user to remove the portable media device and plug it into all additional computers, printers, or other network devices that are to be in communication over the network. After the user is finished configuring additional devices, the user plugs the portable media device back into the computer and is presented with the screen inFIG. 51 notifying the user of successful configuration. The Wizard also presents the user with a “Print” button, allowing the user to print a hard copy of the network settings, which allows the user to manually configure those network devices that do not accept the portable media device or that cannot be automatically configured for the network.FIG. 5J depicts the screen shot presented to the user if the user elects to configure devices manually. The user is prompted to print the settings for manual configuration. - The operation of the Flash Config Wizard is now described with reference to
FIGS. 6-9 .FIG. 6 illustrates the operation of the Flash Config Wizard with respect to generating a wireless configuration. Atstep 610, the Flash Config Wizard prompts the user for a network name. The Flash Config Wizard then gets the wireless configuration settings through a wireless configuration API atstep 620. The wireless configuration API is provided by the OS, such as WZCDLG.DLL in the Microsoft Windows® OS. In an alternative embodiment, the user manually enters the wireless configuration settings. Atstep 630, the Flash Config Wizard generates an XML file containing the wireless configuration settings in accordance with a schema. The Flash Config Wizard transfers the XML file to a wireless provisioning API in the OS so that the host computer may be configured with the wireless settings atstep 640. The Flash Config Wizard also transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device atstep 650. After the user has configured the wireless devices and re-installed the portable media device in the host computer, the Flash Config Wizard uploads device configuration files from the portable media device atstep 660. Atstep 670, the Flash Config Wizard analyzes the device configuration files to determine whether the wireless devices were successfully configured. -
FIG. 7 illustrates the operation of the Flash Config Wizard with respect to generating a LAN configuration. The Flash Config Wizard prompts the user to enter various LAN settings atstep 710. These settings include, for example, the workgroup name and IP settings. The settings are described in more detail below. In an alternative embodiment, the Flash Config Wizard acquires the LAN settings through an API provided by the OS. Atstep 720, the Flash Config Wizard generates an XML file containing the LAN configuration settings in accordance with a schema. The Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device atstep 730. After the user has configured the LAN devices and re-installed the portable media device in the host computer, the Flash Config Wizard uploads device configuration files from the portable media device atstep 740. Atstep 750, the Flash Config Wizard analyzes the device configuration files to determine whether the LAN devices were successfully configured. -
FIG. 8 illustrates the operation of the Flash Config Wizard with respect to generating a WAN configuration. The Flash Config Wizard prompts the user to enter various WAN settings atstep 810. These settings include, for example, the type of WAN and a domain name service (DNS) address. The settings are described in more detail below. In an alternative embodiment, the Flash Config Wizard acquires the WAN settings through an API provided by the OS. Atstep 820, the Flash Config Wizard generates an XML file containing the WAN configuration settings in accordance with a schema. The Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device atstep 830. After the user has configured the WAN devices and re-installed the portable media device in the host computer, the Flash Config Wizard uploads device configuration files from the portable media device atstep 840. Atstep 850, the Flash Config Wizard analyzes the device configuration files to determine whether the WAN devices were successfully configured. -
FIG. 9 illustrates the operation of the Flash Config Wizard with respect to generating a broadband modem configuration. The Flash Config Wizard prompts the user to enter various broadband modem settings atstep 910. These settings are provided by the user's Internet service provider (ISP) and include, for example, a username and password for broadband Internet access. The settings are described in more detail below. In an alternative embodiment, the Flash Config Wizard acquires the LAN settings through an API provided by the OS. Atstep 920, the Flash Config Wizard generates an XML file containing the broadband modem configuration settings in accordance with a schema. The Flash Config Wizard transfers the XML file, along with an autorun file, a network setup application, and a copy of the Flash Config Wizard, to a portable media device atstep 930. After the user has configured the devices for use with the broadband modem and re-installed the portable media device in the host computer, the Flash Config Wizard uploads device configuration files from the portable media device atstep 940. Atstep 950, the Flash Config Wizard analyzes the device configuration files to determine whether the devices were successfully configured. - The procedures described with reference to
FIGS. 6-9 are combined in the Flash Config Wizard when the user wishes to configure multiple types of network settings (e.g. wireless and WAN settings). In this manner, the configuration files are written to the portable media device simultaneously. -
FIG. 10 illustrates the operation of an exemplary device that is configured using a portable media device. Atstep 1010, a device detects a portable media device containing network configuration files in a device to be configured. The device uploads the relevant network configuration settings from the portable media device and is provisioned atstep 1020. If the device supports an automatic discovery protocol, such as UPnP, a computer on the network will immediately recognize the new device and be notified of its availability. In one embodiment, the uploading is performed automatically, without any user intervention. The device searches the stored XML files for the particular data fields it requires, and uploads the corresponding data from the portable media device. In this way, the device only reads data relevant to its operation. Atstep 1030, the device generates a device configuration file and transfers the file to the portable media device. The device configuration file includes, for example, the manufacturer and model of the devices, as well as network configuration settings. The device configuration file is explained in more detail below. - A personal computer generates the network settings and device configuration files according to corresponding XML schemas. In one embodiment of the invention, a personal computer generates network settings and device configuration files for multiple profiles. The files corresponding to each profile a stored in different profile folders on the portable media device. In this manner, a user may maintain configurations for both a home and an office network on the same portable media device.
- In another embodiment, the network settings files include a time-to-live (TTL) setting, and devices configured using the portable media device are denied access to the network after the prescribed TTL has passed. In this way a device is granted only temporary access to the network. In another embodiment, the TTL field is used in conjunction with an authentication scheme, such as a thumbprint. In this way, authenticated devices are granted permanent access to the network while guests are granted only temporary access as determined by the TTL field.
-
FIG. 11 illustrates a conceptualization of the wireless network settings file 1100. Each element offile 1100 represents a wireless configuration setting. Service set identifier (SSID) 1110 is a 1-32 byte string representing the name of the wireless network.SSID 1110 can only occur once.Network Key 1115 is a string that the PC Will automatically generate, or alternatively, receive from the PC user. TheNetwork Key 1115 is used for encryption on the wireless network.Authentication Type 1120 indicates the authentication protocol used by the wireless network.Authentication Type 1120 allows a range of possible values, including open, shared, WiFi Protected Access (WPA), WPA Pre-Shared Key (PSK), WPA-none, WPA2, or WPA2 PSK.Encryption Type 1125 indicates the encryption protocol used by the wireless network.Encryption Type 1125 allows a range of possible values, including none, Wireless Encryption Protocol (WEP), Temporal Key Integrity Protocol (TKIP), and Advanced Encryption Standard (AES). -
Type 1130 indicates a connection type, and may have as its value either extended service set (ESS) in the case of an ad hoc network, or infrastructure basic service set (IBSS) in the case of an infrastructure network.Key Index 1135 indicates the location of the specific key used to encrypt messages, and may have a value of 1, 2, 3, or 4.Key Index 1135 is used with WEP. Key ProvidedInfo 1140 indicates whether a key is provided automatically, and can have a value of either 0 or 1. 802.1X 1145 indicates whether IEEE 802.1X protocol is used on the network, and can have a value of either 0 or 1. 2.4GHz Channel 1150 indicates which 2.4 GHz Channel, if any, is being used by the wireless network, and can have a value in the range of 1 to 14. 5GHz Channel 1155 indicates which 5 GHz channel, if any, is being used by the wireless network, and can have a value of 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, or 161WAP Mode 1160 indicates the mode in which the wireless access point is operating.WAP Mode 1160 can have a value of infrastructure, bridge, repeater, or station. -
EAP Method 1165 indicates the Extensible Authentication Protocol used, and may have a value of EAP-TLS, PEAP-EAP-MSCHAPv2, or PEAP-EAP-TLS. This setting is used for 802.1x authentication only.TTL 1170 indicates a time-to-live element for specifying the length of time a network key is valid. -
FIG. 12 illustrates a conceptualization of a WAN network settings file for WAN configurations. The WAN network settings file 1200 includes the following elements: DNS IP Auto Pushed 1212,Clone MAC Address 1213,MAC Address 1214,DNS1 IP Address 1215,DNS2 IP Address 1216, connectionType 1217, wanConnection 1218,DHCP 1210,Static IP 1220, andPPPoE 1230. DNS IP Auto Pushed 1212 indicates whether a domain name service IP address is automatically pushed to the DHCP client.Clone MAC Address 1213 indicates whether the MAC address of the client should be cloned for use in the WAN, and takes a value of 0 or 1.MAC Address 1214 defines the MAC address of the client.DNS1 IP Address 1215 andDNS2 IP Address 1216 define IP addresses for domain name servers. The connectionType element 1217 specifies whether the connection is via Point-to-Point Protocol over Ethernet (PPPoE) or IP. ThePPPoE element 1230 further includessubelements Username 1231,Password 1232,Service Name 1233, MaxIdle Time 1234, and Auto-Reconnect 1235.Username 1231 defines a username for a device to be configured, andPassword 1232 defines a password for a device to be configured.Service Name 1232 defines a string indicating the name of a PPPoE server. MaxIdle Time 1234 defines a maximum idle time for the device to be configured. Auto-Reconnect 1235 indicates whether the device to be configured should automatically reconnect to the network, and takes a value of 0 or 1. - The wanConnection 1218 element specifies whether the WAN connection is a DHCP connection or a static IP connection.
DHCP element 1210 further includessubelement Hostname 1211.Hostname 1211 defines a string signifying the name of the DHCP host.Static IP element 1220 further includessubelements IP Address 1221,IP Subnet 1222,IP Subnet Mask 1223,DG 1224, DNS1 IP Address 1225, and DNS2 IP Address 1226.IP Address 1221 defines the static IP address of the device to be configured.IP Subnet 1222 defines the IP subnet of the device to be configured.IP Subnet Mask 1223 defines the IP subnet mask of the device to be configured.DG 1224 defines the default gateway for the device to be configured. -
FIG. 13 illustrates a conceptualization of the LAN settings configuration file for LAN configuration.File 1300 includes the following elements:Workgroup Name 1310,IP Settings 1320,IP Subnet 1330,Network Shares 1340,Castle 1350, andDomain Name 1360.Workgroup Name 1310 defines a workgroup name for the LAN.IP Settings 1320 defines the IP settings for the LAN device. TheIP Settings 1320 may includesub elements DHCP 1321 for defining DHCP settings andStatic IP 1322 for defining settings using static IP addressing.IP Subnet 1330 defines an IP subnet for the device to be configured, wherein the IP subnet defined byIP Subnet 1330 may be different from the IP subnet defines inIP Settings 1320.Network Shares 1340 defines the file sharing configuration for the LAN which the device to be configured is to join, including network drive mappings.Castle 1350 is a boolean element for indicating whether Castle-type service is enabled.Domain Name 1360 is a string for indicating the domain name for the LAN. -
FIG. 14 illustrates a conceptualization of the broadband modem settings configuration file for broadband modem configuration. Thefile 1400 includes the following elements:User Name 1410,Password 1420,DHCP 1430,P Address 1440,Connection Type 1450,Link Modulation 1460,ATM Encapsulation 1470, andLink Type 1480.User Name 1410 andPassword 1420 indicate a user name and password for accessing the Internet through a broadband ISP.DHCP 1430 is a boolean element that indicates whether DHCP is used.IP Address 1440 indicates the IP address assigned to the modem.Connection Type 1450 indicates the type of connection, and may have as a value PPP, PPPoE, PPPoA, IPoA, EoA, Dial PPP, and CIP.Link Modulation 1460 indicate the modulation type, and may have as a value VDSL, SDSL, ADSLdmt, ADSLlite, IDSL, HDSL, QPSK, 16 QAM, 64 QAM, 256 QAM, Ethernet, Other, or POTS.ATM Encapsulation 1470 indicates whether ATM encapsulation is LLC or VCMUX.Link Type 1480 indicates whether the link is via DSL, Cable, Ethernet, or POTS. -
FIG. 15 illustrates a conceptualization of the devicesettings configuration file 1500.File 1500 includes identification (ID)settings 1510,network settings 1520, andwireless settings 1530 for a device.ID settings 1510 relate to information regarding the manufacturer of the device, the manufacturer's web site, the model name of the device, the web site for the device model, the firmware version of the firmware in the device, the device's name, a description of the device, the status of the device, a workgroup name for the device, and a presentation URL.Network settings 1520 relate to information regarding the IPv4, IPv6, and MAC addresses of the device, the status of the network interface (e.g. active, no signal, authenticating, disabled), the type of media (e.g. 802.3, 1394, 802.11, USB, Bluetooth), the speed of the connection, and whether DHCP is enabled. -
Wireless settings 1530 relate to information regarding the wireless authentication protocols (e.g. open, shared, WPA-NONE, WPA, WPAPSK, WPA2, WPA2PSK) and the wireless encryption protocols (e.g. WEP, TKIP, AES) used by the device.Wireless settings 1530 further includes wireless settings profiles specific to the function of the device. If the device is a wireless client,wireless settings 1530 includes wi-fi client settings 1532. These settings relate to information regarding the regulatory domain of the device, the transmission power of the device, and the network type (e.g. 802.11a/bg). If the device is a wireless infrastructure device,wireless settings 1530 includes wi-fi infrastructure settings 1534. These settings relate to information regarding the SSID, network type, channel, and signal strength of the wireless infrastructure. If the device is a WAP,wireless settings 1530 includesWAP settings 1536. These settings relate to information regarding the regulatory domain, MAC filter, beacon interval, and network type of the WAP. - It will be appreciated that an improved system and method for network device configuration have been disclosed herein. In view of the many possible embodiments to which the principles of the present invention may be applied, it should be recognized that the embodiments described herein with respect to the drawing figures are meant to be illustrative only and should not be taken as limiting the scope of the invention. For example, those of skill in the art will recognize that the illustrated embodiments can be modified in arrangement and detail without departing from the spirit of the invention. Although the invention is described in terms of software modules or components, those skilled in the art will recognize that such may be equivalently replaced by hardware components. Therefore, the invention as described herein contemplates all such embodiments as may come within the scope of the following claims and equivalents thereof.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/806,369 US7546357B2 (en) | 2004-01-07 | 2004-03-23 | Configuring network settings using portable storage media |
US12/422,750 US7930374B2 (en) | 2004-01-07 | 2009-04-13 | Configuring network settings using portable storage media |
US13/088,943 US8145735B2 (en) | 2004-01-07 | 2011-04-18 | Configuring network settings using portable storage media |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US53479504P | 2004-01-07 | 2004-01-07 | |
US10/806,369 US7546357B2 (en) | 2004-01-07 | 2004-03-23 | Configuring network settings using portable storage media |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/422,750 Continuation US7930374B2 (en) | 2004-01-07 | 2009-04-13 | Configuring network settings using portable storage media |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050149204A1 true US20050149204A1 (en) | 2005-07-07 |
US7546357B2 US7546357B2 (en) | 2009-06-09 |
Family
ID=36707197
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/806,772 Abandoned US20050149732A1 (en) | 2004-01-07 | 2004-03-23 | Use of static Diffie-Hellman key with IPSec for authentication |
US10/806,369 Active 2026-03-30 US7546357B2 (en) | 2004-01-07 | 2004-03-23 | Configuring network settings using portable storage media |
US12/422,750 Active 2024-09-09 US7930374B2 (en) | 2004-01-07 | 2009-04-13 | Configuring network settings using portable storage media |
US13/088,943 Expired - Lifetime US8145735B2 (en) | 2004-01-07 | 2011-04-18 | Configuring network settings using portable storage media |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/806,772 Abandoned US20050149732A1 (en) | 2004-01-07 | 2004-03-23 | Use of static Diffie-Hellman key with IPSec for authentication |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/422,750 Active 2024-09-09 US7930374B2 (en) | 2004-01-07 | 2009-04-13 | Configuring network settings using portable storage media |
US13/088,943 Expired - Lifetime US8145735B2 (en) | 2004-01-07 | 2011-04-18 | Configuring network settings using portable storage media |
Country Status (3)
Country | Link |
---|---|
US (4) | US20050149732A1 (en) |
CN (1) | CN1761256A (en) |
ZA (1) | ZA200410331B (en) |
Cited By (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060069819A1 (en) * | 2004-09-28 | 2006-03-30 | Microsoft Corporation | Universal serial bus device |
US20060069814A1 (en) * | 2004-09-28 | 2006-03-30 | Abraham Dalen M | Mass storage device with near field communications |
US20060084411A1 (en) * | 2004-10-14 | 2006-04-20 | Dell Products L.P. | Wireless infrastructure device for providing security in a wireless network |
US20060082817A1 (en) * | 2004-10-18 | 2006-04-20 | Microsoft Corporation | Method and system for configuring an electronic device |
US20060171537A1 (en) * | 2005-01-21 | 2006-08-03 | Cisco Technology, Inc. | Wireless network credential provisioning |
US20060224748A1 (en) * | 2005-03-15 | 2006-10-05 | Microsoft Corporation | Service support framework for peer to peer applications |
US20060236409A1 (en) * | 2005-02-18 | 2006-10-19 | Microsoft Corporation | Volatile portable memory |
US20070061485A1 (en) * | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Network address selection |
US20070066119A1 (en) * | 2005-09-21 | 2007-03-22 | Tsung-Chu Wu | Memory device with serial AT attachment |
US20070168553A1 (en) * | 2005-12-29 | 2007-07-19 | Microsoft Corporation | Ad hoc wireless network create/join user experience |
US20070255945A1 (en) * | 2006-04-28 | 2007-11-01 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US20080130530A1 (en) * | 2006-12-04 | 2008-06-05 | Avraham Gabay | Method and apparatus for creating and connecting to an ad hoc wireless cell |
US20080281953A1 (en) * | 2007-05-07 | 2008-11-13 | Mocana Corporation | Managing network components using USB keys |
US20080313085A1 (en) * | 2007-06-14 | 2008-12-18 | Motorola, Inc. | System and method to share a guest version of rights between devices |
US20090083449A1 (en) * | 2005-06-17 | 2009-03-26 | Governing Dynamics, Llc | Synchronization for Wireless Devices |
EP2068495A1 (en) * | 2007-12-05 | 2009-06-10 | Hirschmann Automation and Control Gmbh | Offline configuration of switches |
WO2009122146A1 (en) * | 2008-03-31 | 2009-10-08 | British Telecommunications Public Limited Company | Method of installing a wireless network |
US20090257804A1 (en) * | 2008-04-10 | 2009-10-15 | Manico Joseph A | Simplified walk-up enablement of internet-based, personalized access to retail imaging devices and services |
US20090276524A1 (en) * | 2007-03-19 | 2009-11-05 | Fujitsu Limited | Thin client terminal, operation program and method thereof, and thin client system |
US20090281676A1 (en) * | 2008-04-16 | 2009-11-12 | Beavis Russell H | Systems, Apparatus, and Methods for the Management and Control of Remotely Controlled Devices |
US20100054156A1 (en) * | 2008-08-29 | 2010-03-04 | Dehaan Michael Paul | Systems and methods for software provisioning in multiple network configuration environment |
US20100054715A1 (en) * | 2004-10-25 | 2010-03-04 | Apple Inc. | Image scaling arrangement |
US20100217854A1 (en) * | 2003-10-03 | 2010-08-26 | Ramesh Durairaj | Method and Apparatus for Intelligent Management of a Network Element |
US20100274917A1 (en) * | 2004-11-30 | 2010-10-28 | Ali Cherchali | Technique for Automated MAC Address Cloning |
US20100318881A1 (en) * | 2008-02-20 | 2010-12-16 | Andreas Limber | Flexible Node Identity for Telecom Nodes |
EP2326045A1 (en) * | 2009-11-23 | 2011-05-25 | Samsung Electronics Co., Ltd. | Method for setting network environment and storage device applying the same |
US20110196946A1 (en) * | 2004-01-07 | 2011-08-11 | Microsoft Corporation | Configuring network settings using portable storage media |
US20110289229A1 (en) * | 2010-05-05 | 2011-11-24 | BridgeCo Inc. | Methods and systems for wi-fi setup and configuration |
US20130272224A1 (en) * | 2012-04-12 | 2013-10-17 | Ricoh Company, Ltd. | Wireless communication system, wireless communication method, and wireless terminal |
US20150071052A1 (en) * | 2013-09-09 | 2015-03-12 | Qualcomm Innovation Center, Inc. | Reconfiguring a headless wireless device |
CN104518910A (en) * | 2013-10-07 | 2015-04-15 | 施耐德电器工业公司 | Device for configuration of ethernet equipment and method for configuration of ethernet equipment using such a device |
US20170200144A1 (en) * | 2016-01-13 | 2017-07-13 | Paypal, Inc. | Dongle device for automatic pairing of payment terminal to mobile computing device |
US9736019B2 (en) * | 2015-05-14 | 2017-08-15 | Eero Inc. | Methods for dynamic router configuration in a mesh network |
US9882774B2 (en) | 2015-02-02 | 2018-01-30 | Eero Inc. | Systems and methods for intuitive home networking |
US10223296B2 (en) * | 2015-09-28 | 2019-03-05 | Orange | Method of transferring configuration information for a connected object |
US10275147B2 (en) * | 2009-12-02 | 2019-04-30 | Samsung Electronics Co., Ltd. | Mobile device and control method thereof |
US10296355B2 (en) * | 2015-06-30 | 2019-05-21 | Skidata Ag | Method for the configuration of electronic devices, in particular for the configuration of components of an access control system |
US10536336B2 (en) | 2005-10-19 | 2020-01-14 | Apple Inc. | Remotely configured media device |
US10609626B2 (en) | 2016-09-27 | 2020-03-31 | A9.Com. Inc. | Methods for network configuration sharing |
CN111277549A (en) * | 2018-12-05 | 2020-06-12 | 杭州希戈科技有限公司 | Security service method and system adopting block chain |
CN111865564A (en) * | 2020-07-29 | 2020-10-30 | 北京浪潮数据技术有限公司 | IPSec communication establishing method and system |
US10848885B2 (en) | 2006-09-12 | 2020-11-24 | Sonos, Inc. | Zone scene management |
US10949163B2 (en) | 2003-07-28 | 2021-03-16 | Sonos, Inc. | Playback device |
US10965545B2 (en) | 2004-06-05 | 2021-03-30 | Sonos, Inc. | Playback device connection |
US10966025B2 (en) | 2006-09-12 | 2021-03-30 | Sonos, Inc. | Playback device pairing |
US10983750B2 (en) | 2004-04-01 | 2021-04-20 | Sonos, Inc. | Guest access to a media playback system |
US11106425B2 (en) | 2003-07-28 | 2021-08-31 | Sonos, Inc. | Synchronizing operations among a plurality of independently clocked digital data processing devices |
US11106424B2 (en) | 2003-07-28 | 2021-08-31 | Sonos, Inc. | Synchronizing operations among a plurality of independently clocked digital data processing devices |
US11132170B2 (en) | 2003-07-28 | 2021-09-28 | Sonos, Inc. | Adjusting volume levels |
US11265652B2 (en) | 2011-01-25 | 2022-03-01 | Sonos, Inc. | Playback device pairing |
US11294618B2 (en) | 2003-07-28 | 2022-04-05 | Sonos, Inc. | Media player system |
US11363449B2 (en) * | 2019-07-12 | 2022-06-14 | Apple Inc. | Cellular wireless service preferences transfer |
US11385858B2 (en) | 2006-09-12 | 2022-07-12 | Sonos, Inc. | Predefined multi-channel listening environment |
US11403062B2 (en) | 2015-06-11 | 2022-08-02 | Sonos, Inc. | Multiple groupings in a playback system |
US11429343B2 (en) | 2011-01-25 | 2022-08-30 | Sonos, Inc. | Stereo playback configuration and control |
US11481182B2 (en) | 2016-10-17 | 2022-10-25 | Sonos, Inc. | Room association based on name |
US11650784B2 (en) | 2003-07-28 | 2023-05-16 | Sonos, Inc. | Adjusting volume levels |
US11894975B2 (en) | 2004-06-05 | 2024-02-06 | Sonos, Inc. | Playback device connection |
Families Citing this family (113)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7574603B2 (en) * | 2003-11-14 | 2009-08-11 | Microsoft Corporation | Method of negotiating security parameters and authenticating users interconnected to a network |
JP3955025B2 (en) * | 2004-01-15 | 2007-08-08 | 松下電器産業株式会社 | Mobile radio terminal device, virtual private network relay device, and connection authentication server |
US8639819B2 (en) * | 2004-02-05 | 2014-01-28 | Nokia Corporation | Ad-hoc connection between electronic devices |
US7895648B1 (en) * | 2004-03-01 | 2011-02-22 | Cisco Technology, Inc. | Reliably continuing a secure connection when the address of a machine at one end of the connection changes |
US20050251589A1 (en) * | 2004-05-04 | 2005-11-10 | Jung-Chung Wang | Method of authenticating universal serail bus on-the-go device |
JP2007334379A (en) * | 2004-10-05 | 2007-12-27 | Matsushita Electric Ind Co Ltd | Processing device |
US8396213B2 (en) * | 2005-01-21 | 2013-03-12 | Certicom Corp. | Elliptic curve random number generation |
US20060184380A1 (en) * | 2005-02-15 | 2006-08-17 | Samsung Electronics Co., Ltd. | XML-based resource data structures and networks managed by XML-based resource data structures |
US7822982B2 (en) * | 2005-06-16 | 2010-10-26 | Hewlett-Packard Development Company, L.P. | Method and apparatus for automatic and secure distribution of a symmetric key security credential in a utility computing environment |
US7539723B2 (en) * | 2005-07-28 | 2009-05-26 | International Business Machines Corporation | System for configuring a cellular telephone to operate according to policy guidelines of a group of users |
US20070103277A1 (en) * | 2005-11-09 | 2007-05-10 | Honeywell International, Inc. | Security system enhancement device key |
US9203858B2 (en) * | 2005-11-11 | 2015-12-01 | Ca, Inc. | Method and system for generating an advisory message for an endpoint device |
US20070130069A1 (en) * | 2005-12-06 | 2007-06-07 | Microsoft Corporation | Encapsulating Address Components |
US20070214502A1 (en) * | 2006-03-08 | 2007-09-13 | Mcalister Donald K | Technique for processing data packets in a communication network |
US7675867B1 (en) | 2006-04-19 | 2010-03-09 | Owl Computing Technologies, Inc. | One-way data transfer system with built-in data verification mechanism |
US20070255868A1 (en) * | 2006-04-26 | 2007-11-01 | Cisco Technology, Inc. (A California Corporation) | Method and system for managing a network device using a slave USB interface |
CN101064921B (en) * | 2006-04-30 | 2011-12-21 | 华为技术有限公司 | Method for realizing encrypted negotiation for user equipment and network side |
US7774837B2 (en) * | 2006-06-14 | 2010-08-10 | Cipheroptics, Inc. | Securing network traffic by distributing policies in a hierarchy over secure tunnels |
US20080222693A1 (en) * | 2006-08-08 | 2008-09-11 | Cipheroptics, Inc. | Multiple security groups with common keys on distributed networks |
US8082574B2 (en) * | 2006-08-11 | 2011-12-20 | Certes Networks, Inc. | Enforcing security groups in network of data processors |
US20080072281A1 (en) * | 2006-09-14 | 2008-03-20 | Willis Ronald B | Enterprise data protection management for providing secure communication in a network |
US20080072033A1 (en) * | 2006-09-19 | 2008-03-20 | Mcalister Donald | Re-encrypting policy enforcement point |
US8379638B2 (en) * | 2006-09-25 | 2013-02-19 | Certes Networks, Inc. | Security encapsulation of ethernet frames |
US8284943B2 (en) * | 2006-09-27 | 2012-10-09 | Certes Networks, Inc. | IP encryption over resilient BGP/MPLS IP VPN |
US8607301B2 (en) * | 2006-09-27 | 2013-12-10 | Certes Networks, Inc. | Deploying group VPNS and security groups over an end-to-end enterprise network |
US8104082B2 (en) * | 2006-09-29 | 2012-01-24 | Certes Networks, Inc. | Virtual security interface |
US8046820B2 (en) * | 2006-09-29 | 2011-10-25 | Certes Networks, Inc. | Transporting keys between security protocols |
US20080162922A1 (en) * | 2006-12-27 | 2008-07-03 | Swartz Troy A | Fragmenting security encapsulated ethernet frames |
US7818571B2 (en) * | 2007-02-09 | 2010-10-19 | Microsoft Corporation | Securing wireless communications between devices |
US7864762B2 (en) * | 2007-02-14 | 2011-01-04 | Cipheroptics, Inc. | Ethernet encryption over resilient virtual private LAN services |
CN101321080B (en) * | 2007-06-04 | 2010-07-28 | 华为技术有限公司 | Method for configuring network appliance, network appliance and network system |
US9918218B2 (en) | 2007-06-12 | 2018-03-13 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Method and system for a networked self-configuring communication device utilizing user preference information |
US20090034738A1 (en) * | 2007-07-31 | 2009-02-05 | Charles Rodney Starrett | Method and apparatus for securing layer 2 networks |
CN101374043B (en) * | 2007-08-24 | 2010-09-22 | 管海明 | Cipher key negotiating method, enciphering/deciphering method and signature/verification method |
JP4687703B2 (en) * | 2007-10-02 | 2011-05-25 | ソニー株式会社 | RECORDING SYSTEM, INFORMATION PROCESSING DEVICE, STORAGE DEVICE, RECORDING METHOD, AND PROGRAM |
JP4954022B2 (en) * | 2007-11-05 | 2012-06-13 | キヤノン株式会社 | Information processing apparatus, information processing apparatus control method, and information processing apparatus control program |
KR101006818B1 (en) * | 2007-12-12 | 2011-01-10 | 이근진 | Apparatus that decreasing standby power of electronic appliance and receptacle |
WO2009088687A2 (en) * | 2007-12-31 | 2009-07-16 | Datalogic Mobile, Inc. | Systems and methods for configuring, updating, and booting an alternate operating system on a portable data reader |
JP5468557B2 (en) * | 2008-02-27 | 2014-04-09 | フィッシャー−ローズマウント システムズ インコーポレイテッド | Wireless device join key supply |
US20090240942A1 (en) * | 2008-03-20 | 2009-09-24 | Canon Kabushiki Kaisha | Long term key establishment for embedded devices |
US8837491B2 (en) | 2008-05-27 | 2014-09-16 | Glue Networks | Regional virtual VPN |
US8147735B2 (en) * | 2008-07-09 | 2012-04-03 | Eltron Research & Development, Inc. | Semipermeable polymers and method for producing same |
US8799893B2 (en) * | 2008-10-15 | 2014-08-05 | International Business Machines Corporation | Method, system and computer program product for solution replication |
WO2010068698A2 (en) * | 2008-12-09 | 2010-06-17 | Glue Networks, Inc. | System and method for providing virtual private networks |
US9253034B1 (en) * | 2009-06-01 | 2016-02-02 | Juniper Networks, Inc. | Mass activation of network devices |
US8156213B1 (en) | 2009-07-27 | 2012-04-10 | Juniper Networks, Inc. | Merging network device configuration schemas |
WO2011014586A1 (en) * | 2009-07-28 | 2011-02-03 | Belkin International, Inc. | Self healing networking device systems and related methods |
US8631284B2 (en) | 2010-04-30 | 2014-01-14 | Western Digital Technologies, Inc. | Method for providing asynchronous event notification in systems |
US8762682B1 (en) | 2010-07-02 | 2014-06-24 | Western Digital Technologies, Inc. | Data storage apparatus providing host full duplex operations using half duplex storage devices |
GB2495018B (en) | 2010-07-19 | 2017-02-22 | Owl Computing Tech Inc | Secure acknowledgment device for one-way data transfer system |
TW201206129A (en) * | 2010-07-20 | 2012-02-01 | Gemtek Technology Co Ltd | Virtual private network system and network device thereof |
JP5668397B2 (en) * | 2010-10-01 | 2015-02-12 | ミツミ電機株式会社 | Communication device setting device, communication device setting method, and communication device setting program |
US8793780B2 (en) | 2011-04-11 | 2014-07-29 | Blackberry Limited | Mitigation of application-level distributed denial-of-service attacks |
US8346672B1 (en) * | 2012-04-10 | 2013-01-01 | Accells Technologies (2009), Ltd. | System and method for secure transaction process via mobile device |
DE102011111736A1 (en) * | 2011-08-26 | 2013-02-28 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method for executing application e.g. word processing in data network, involves executing application by application service, transmitting input for processing from client computer, and transferring output to client computer |
CA3135341C (en) * | 2012-01-12 | 2023-11-07 | Blackberry Limited | System and method of lawful access to secure communications |
CN104094249B (en) | 2012-04-25 | 2018-09-28 | 企业服务发展公司有限责任合伙企业 | It is transmitted using the file of XML |
US9716691B2 (en) * | 2012-06-07 | 2017-07-25 | Early Warning Services, Llc | Enhanced 2CHK authentication security with query transactions |
US8625805B1 (en) | 2012-07-16 | 2014-01-07 | Wickr Inc. | Digital security bubble |
CN103581134A (en) * | 2012-07-31 | 2014-02-12 | 深圳市共进电子股份有限公司 | Method and system for network access |
US20140280804A1 (en) * | 2013-03-13 | 2014-09-18 | Dell Products L.P. | Relationship driven dynamic workflow system |
US9760528B1 (en) * | 2013-03-14 | 2017-09-12 | Glue Networks, Inc. | Methods and systems for creating a network |
US9928082B1 (en) | 2013-03-19 | 2018-03-27 | Gluware, Inc. | Methods and systems for remote device configuration |
US9596077B2 (en) * | 2013-04-22 | 2017-03-14 | Unisys Corporation | Community of interest-based secured communications over IPsec |
US9866591B1 (en) | 2013-06-25 | 2018-01-09 | Wickr Inc. | Enterprise messaging platform |
US10567349B2 (en) | 2013-06-25 | 2020-02-18 | Wickr Inc. | Secure time-to-live |
US9830089B1 (en) | 2013-06-25 | 2017-11-28 | Wickr Inc. | Digital data sanitization |
US10129260B1 (en) | 2013-06-25 | 2018-11-13 | Wickr Inc. | Mutual privacy management |
US9515824B2 (en) * | 2013-10-21 | 2016-12-06 | Aruba Networks, Inc. | Provisioning devices for secure wireless local area networks |
NL2011717C2 (en) * | 2013-10-31 | 2015-05-04 | Ubiqu B V | A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products. |
GB201319591D0 (en) | 2013-11-06 | 2013-12-18 | Microsoft Corp | Network Access |
KR101543578B1 (en) | 2014-02-07 | 2015-08-11 | 현대자동차주식회사 | A terminal certification system for vehicle network connection and certification method thereof |
US9698976B1 (en) | 2014-02-24 | 2017-07-04 | Wickr Inc. | Key management and dynamic perfect forward secrecy |
AU2015277000C1 (en) * | 2014-06-18 | 2019-11-28 | Visa International Service Association | Efficient methods for authenticated communication |
US9584530B1 (en) | 2014-06-27 | 2017-02-28 | Wickr Inc. | In-band identity verification and man-in-the-middle defense |
WO2016033610A1 (en) * | 2014-08-29 | 2016-03-03 | Visa International Service Association | Methods for secure cryptogram generation |
US9654288B1 (en) | 2014-12-11 | 2017-05-16 | Wickr Inc. | Securing group communications |
CN112260826B (en) | 2015-01-27 | 2023-12-26 | 维萨国际服务协会 | Method for secure credential provisioning |
US9785412B1 (en) | 2015-02-27 | 2017-10-10 | Glue Networks, Inc. | Methods and systems for object-oriented modeling of networks |
WO2016161266A1 (en) | 2015-04-02 | 2016-10-06 | Google Inc. | Efficient network stack for wireless application protocols |
US10455066B2 (en) | 2015-04-03 | 2019-10-22 | Pinn, Inc. | Mobile system with wireless earbud |
NL2014743B1 (en) * | 2015-04-30 | 2017-01-18 | Ubiqu B V | A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products. |
CN105120043A (en) * | 2015-06-25 | 2015-12-02 | 北京讯光科技发展有限责任公司 | Automatic test system of telephone device |
US10255420B2 (en) * | 2015-08-04 | 2019-04-09 | Ge Aviation Systems, Llc | Configuring cryptographic systems |
US9503969B1 (en) | 2015-08-25 | 2016-11-22 | Afero, Inc. | Apparatus and method for a dynamic scan interval for a wireless device |
US9843929B2 (en) | 2015-08-21 | 2017-12-12 | Afero, Inc. | Apparatus and method for sharing WiFi security data in an internet of things (IoT) system |
US10033706B2 (en) * | 2015-12-04 | 2018-07-24 | Samsara Networks Inc. | Secure offline data offload in a sensor network |
US10447784B2 (en) | 2015-12-14 | 2019-10-15 | Afero, Inc. | Apparatus and method for modifying packet interval timing to identify a data transfer condition |
US10805344B2 (en) | 2015-12-14 | 2020-10-13 | Afero, Inc. | Apparatus and method for obscuring wireless communication patterns |
US10091242B2 (en) * | 2015-12-14 | 2018-10-02 | Afero, Inc. | System and method for establishing a secondary communication channel to control an internet of things (IOT) device |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
US10291607B1 (en) | 2016-02-02 | 2019-05-14 | Wickr Inc. | Providing real-time events to applications |
US9596079B1 (en) | 2016-04-14 | 2017-03-14 | Wickr Inc. | Secure telecommunications |
US9590958B1 (en) | 2016-04-14 | 2017-03-07 | Wickr Inc. | Secure file transfer |
WO2017214288A1 (en) | 2016-06-07 | 2017-12-14 | Visa International Service Association | Multi-level communication encryption |
WO2017214380A1 (en) * | 2016-06-08 | 2017-12-14 | University Of Florida Research Foundation, Incorporated | Practical end-to-end cryptographic authentication for telephony over voice channels |
US10530865B2 (en) * | 2017-04-19 | 2020-01-07 | Vmware, Inc. | Offline sideloading for enrollment of devices in a mobile device management system |
CN107197462B (en) * | 2017-06-28 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Wireless network type detection method and device and electronic equipment |
JP7035481B2 (en) * | 2017-11-22 | 2022-03-15 | 横河電機株式会社 | Setting system, setting device, setting method, program and recording medium |
CN109947482B (en) * | 2017-12-21 | 2022-07-29 | 深圳Tcl新技术有限公司 | Loading method of USB (universal serial bus) equipment, storage medium and smart television |
US10805153B2 (en) * | 2018-01-31 | 2020-10-13 | Salesforce.Com, Inc. | Provisioning network devices using a vendor-neutral platform |
EP3831111A1 (en) * | 2018-08-02 | 2021-06-09 | Telefonaktiebolaget LM Ericsson (publ) | Secured authenticated communication between an initiator and a responder |
WO2020042023A1 (en) * | 2018-08-29 | 2020-03-05 | 区链通网络有限公司 | Instant messaging data encryption method and apparatus |
US10904088B2 (en) * | 2018-11-15 | 2021-01-26 | Western Digital Technologies, Inc. | Reconfiguring network settings for operating configuration installation |
JP7273523B2 (en) * | 2019-01-25 | 2023-05-15 | 株式会社東芝 | Communication control device and communication control system |
JP7231057B2 (en) * | 2019-03-15 | 2023-03-01 | オムロン株式会社 | Safeguard settings cloning |
US10936336B1 (en) | 2019-09-24 | 2021-03-02 | Amazon Technologies, Inc. | Configuration change tracking with multiple manifests |
US10958522B1 (en) * | 2019-09-24 | 2021-03-23 | Amazon Technologies, Inc. | Configuration tracking perimeter |
US11036209B2 (en) | 2019-09-24 | 2021-06-15 | Rockwell Automation Technologies, Inc. | Peer-level control of industrial automation system components |
US11269903B1 (en) * | 2019-09-27 | 2022-03-08 | Amazon Technologies, Inc. | Indexing and retrieval of configuration data |
US20230050390A1 (en) * | 2021-08-12 | 2023-02-16 | Dish Network L.L.C. | System and method for generating a video signal |
CN113746861B (en) * | 2021-09-13 | 2023-03-14 | 南京首传信安科技有限公司 | Data transmission encryption and decryption method and encryption and decryption system based on national encryption technology |
CN114338153B (en) * | 2021-12-28 | 2023-07-25 | 杭州迪普科技股份有限公司 | IPSec negotiation method and device |
Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933504A (en) * | 1995-05-18 | 1999-08-03 | Certicom Corp. | Strengthened public key protocol |
US6052720A (en) * | 1998-05-14 | 2000-04-18 | Sun Microsystems, Inc. | Generic schema for storing configuration information on a server computer |
US6078667A (en) * | 1996-10-10 | 2000-06-20 | Certicom Corp. | Generating unique and unpredictable values |
US6148354A (en) * | 1999-04-05 | 2000-11-14 | M-Systems Flash Disk Pioneers Ltd. | Architecture for a universal serial bus-based PC flash disk |
US6178507B1 (en) * | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
US6195433B1 (en) * | 1998-05-08 | 2001-02-27 | Certicom Corp. | Private key validity and validation |
US20010014153A1 (en) * | 1997-10-14 | 2001-08-16 | Johnson Donald B. | Key validation scheme |
US20020087868A1 (en) * | 2000-08-31 | 2002-07-04 | King James E. | Configuring processing units |
US20020090085A1 (en) * | 2000-12-27 | 2002-07-11 | Vanstone Scott A. | Method of public key generation |
US6449642B2 (en) * | 1998-09-15 | 2002-09-10 | Microsoft Corporation | Method and system for integrating a client computer into a computer network |
US20020152380A1 (en) * | 2001-04-12 | 2002-10-17 | Microsoft Corporation | Methods and systems for unilateral authentication of messages |
US20030031188A1 (en) * | 2001-08-08 | 2003-02-13 | Kabushiki Kaisha Toshiba. | Method of providing appropriate configuration information for communication application programs |
US6526264B2 (en) * | 2000-11-03 | 2003-02-25 | Cognio, Inc. | Wideband multi-protocol wireless radio transceiver system |
US20030101247A1 (en) * | 2001-11-07 | 2003-05-29 | Microsoft Corporation | Method and system for configuring a computer for real-time communication |
US20030217126A1 (en) * | 2002-05-14 | 2003-11-20 | Polcha Andrew J. | System and method for automatically configuring remote computer |
US6654841B2 (en) * | 2001-05-03 | 2003-11-25 | Power Quotient International Company, Inc. | USB interface flash memory card reader with a built-in flash memory |
US20030225971A1 (en) * | 2002-05-29 | 2003-12-04 | Yuji Oishi | USB storage device and program |
US20040002943A1 (en) * | 2002-06-28 | 2004-01-01 | Merrill John Wickens Lamb | Systems and methods for application delivery and configuration management of mobile devices |
US20040010429A1 (en) * | 2002-07-12 | 2004-01-15 | Microsoft Corporation | Deployment of configuration information |
US6687492B1 (en) * | 2002-03-01 | 2004-02-03 | Cognio, Inc. | System and method for antenna diversity using joint maximal ratio combining |
US20040024875A1 (en) * | 2002-07-30 | 2004-02-05 | Microsoft Corporation | Schema-based services for identity-based access to device data |
US20040038592A1 (en) * | 2002-08-21 | 2004-02-26 | Fu-I Yang | USB flash drive |
US6700450B2 (en) * | 2002-07-29 | 2004-03-02 | Cognio, Inc. | Voltage-controlled oscillator with an automatic amplitude control circuit |
US6714605B2 (en) * | 2002-04-22 | 2004-03-30 | Cognio, Inc. | System and method for real-time spectrum analysis in a communication device |
US6728517B2 (en) * | 2002-04-22 | 2004-04-27 | Cognio, Inc. | Multiple-input multiple-output radio transceiver |
US6785520B2 (en) * | 2002-03-01 | 2004-08-31 | Cognio, Inc. | System and method for antenna diversity using equal power joint maximal ratio combining |
US20040221298A1 (en) * | 2003-05-02 | 2004-11-04 | Microsoft Corporation | Network device drivers using a communication transport |
US6850735B2 (en) * | 2002-04-22 | 2005-02-01 | Cognio, Inc. | System and method for signal classiciation of signals in a frequency band |
US7013331B2 (en) * | 2002-12-20 | 2006-03-14 | Nokia, Inc. | Automated bulk configuration of network devices |
Family Cites Families (141)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2311365A1 (en) | 1975-05-13 | 1976-12-10 | Innovation Ste Int | SYSTEM FOR TRANSFERRING AND STORING DATA IN A PERSONAL AND CONFIDENTIAL WAY BY MEANS OF PORTABLE INDEPENDENT ELECTRONIC OBJECTS |
US4805222A (en) | 1985-12-23 | 1989-02-14 | International Bioaccess Systems Corporation | Method and apparatus for verifying an individual's identity |
US4783766A (en) | 1986-05-30 | 1988-11-08 | Seeq Technology, Inc. | Block electrically erasable EEPROM |
US4970692A (en) | 1987-09-01 | 1990-11-13 | Waferscale Integration, Inc. | Circuit for controlling a flash EEPROM having three distinct modes of operation by allowing multiple functionality of a single pin |
US6614768B1 (en) | 1989-04-28 | 2003-09-02 | Broadcom Corporation | Enhanced mobility and address resolution in a wireless premises based network |
US4922734A (en) | 1989-07-10 | 1990-05-08 | Paul Iannucci | Locking assembly for preventing the unauthorized use of an electrically powered device |
US5949776A (en) | 1990-01-18 | 1999-09-07 | Norand Corporation | Hierarchical communication system using premises, peripheral and vehicular local area networking |
GB9223890D0 (en) | 1992-11-13 | 1993-01-06 | Ncr Int Inc | Wireless local area network system |
US5566331A (en) | 1994-01-24 | 1996-10-15 | University Corporation For Atmospheric Research | Mass storage system for file-systems |
US5557124A (en) | 1994-03-11 | 1996-09-17 | Waferscale Integration, Inc. | Flash EEPROM and EPROM arrays with select transistors within the bit line pitch |
US5553314A (en) | 1994-04-12 | 1996-09-03 | Motorola, Inc. | Method of configuring a communication unit using a wireless portable configuration device |
US5815682A (en) | 1994-12-13 | 1998-09-29 | Microsoft Corporation | Device independent modem interface |
US5727212A (en) | 1995-04-12 | 1998-03-10 | International Business Machines Corporation | Object oriented device driver system for procedural device drivers |
GB9517943D0 (en) | 1995-09-02 | 1995-11-01 | At & T Corp | Radio communication device and method |
US5918018A (en) | 1996-02-09 | 1999-06-29 | Secure Computing Corporation | System and method for achieving network separation |
US5838907A (en) | 1996-02-20 | 1998-11-17 | Compaq Computer Corporation | Configuration manager for network devices and an associated method for providing configuration information thereto |
US6148332A (en) | 1996-04-24 | 2000-11-14 | Earthlink, Inc. | Mandatory message display and reporting system |
US5918158A (en) | 1996-07-24 | 1999-06-29 | Lucent Technologies Inc. | Two-way wireless messaging system |
US5930362A (en) * | 1996-10-09 | 1999-07-27 | At&T Wireless Services Inc | Generation of encryption key |
FR2756411B1 (en) | 1996-11-28 | 1998-12-31 | Sgs Thomson Microelectronics | METHOD FOR ERASING A NON-VOLATILE AND ELECTRICALLY ERASABLE MEMORY, AND ASSOCIATED DEVICES |
US5898668A (en) | 1996-12-13 | 1999-04-27 | Siemens Information And Communication Networks, Inc. | Method and system for increasing quality of service at or below a threshold cost |
US5966082A (en) | 1997-05-23 | 1999-10-12 | Intemec Ip Corp. | Method of flagging partial write in RF tags |
JP3045985B2 (en) | 1997-08-07 | 2000-05-29 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Connection establishment method, communication method, state change transmission method, state change execution method, wireless device, wireless device, and computer |
US6041075A (en) | 1997-09-29 | 2000-03-21 | Intel Corporation | Scheme for the detection of V.25 ter responses from modem, on a TAP1 voice call |
US6226719B1 (en) | 1998-05-08 | 2001-05-01 | Apple Computer, Inc. | Organizing memory extents of OS input/output control |
US6202147B1 (en) | 1998-06-29 | 2001-03-13 | Sun Microsystems, Inc. | Platform-independent device drivers |
JP3278616B2 (en) | 1998-08-20 | 2002-04-30 | 日本電信電話株式会社 | Mobile user accommodation device |
US6480711B1 (en) | 1998-09-15 | 2002-11-12 | Nms Communications Corporation | Method and system for wireless data communication over the internet |
US6470397B1 (en) | 1998-11-16 | 2002-10-22 | Qlogic Corporation | Systems and methods for network and I/O device drivers |
US6795967B1 (en) | 1999-01-26 | 2004-09-21 | Microsoft Corporation | Changing user identities without closing applications |
JP3492541B2 (en) | 1999-02-24 | 2004-02-03 | 埼玉日本電気株式会社 | Wireless communication equipment |
US6411823B1 (en) | 1999-03-08 | 2002-06-25 | E. Lead Electronic Co., Ltd. | Replaceable signal cable making a sound-controlled or externally dialed hand-free system universally compatible with all types of cellular phones |
FR2791159B1 (en) | 1999-03-15 | 2001-05-04 | Bull Cp8 | METHOD FOR ACCESSING AN OBJECT USING A WEB-BASED BROWSER COOPERATING WITH A CHIP CARD AND ARCHITECTURE FOR IMPLEMENTING THE METHOD |
US20010029607A1 (en) | 1999-04-06 | 2001-10-11 | Microsoft Corporation | System and method for application installation management |
US6633929B1 (en) | 1999-04-30 | 2003-10-14 | Microsoft Corporation | Method and system for abstracting network device drivers |
US6792286B1 (en) | 1999-06-28 | 2004-09-14 | Legerity, Inc. | Apparatus for transmitting and receiving signals |
US6658018B1 (en) | 1999-06-30 | 2003-12-02 | Intel Corporation | Method and system of providing advanced teaming functionality capable of utilizing heterogeneous adapters to improve utility and performance |
EP2109265B1 (en) | 1999-07-15 | 2015-09-30 | Telefonaktiebolaget L M Ericsson (publ) | Scheduling and admission control of packet data traffic |
KR20010021111A (en) | 1999-07-23 | 2001-03-15 | 스테븐 디.피터스 | Messaging and status indication for wireless communication devices |
US6600726B1 (en) | 1999-09-29 | 2003-07-29 | Mobilian Corporation | Multiple wireless communication protocol methods and apparatuses |
US6324537B1 (en) | 1999-09-30 | 2001-11-27 | M-Systems Flash Disk Pioneers Ltd. | Device, system and method for data access control |
US6704293B1 (en) | 1999-12-06 | 2004-03-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Broadcast as a triggering mechanism for route discovery in ad-hoc networks |
ATE311063T1 (en) * | 2000-02-08 | 2005-12-15 | Swisscom Mobile Ag | UNITED LOGIN PROCESS |
GB2366631B (en) * | 2000-03-04 | 2004-10-20 | Ericsson Telefon Ab L M | Communication node, communication network and method of recovering from a temporary failure of a node |
US7181542B2 (en) * | 2000-04-12 | 2007-02-20 | Corente, Inc. | Method and system for managing and configuring virtual private networks |
US7047424B2 (en) | 2000-04-12 | 2006-05-16 | Corente, Inc. | Methods and systems for hairpins in virtual networks |
US7000015B2 (en) | 2000-04-24 | 2006-02-14 | Microsoft Corporation | System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device |
US6615038B1 (en) | 2000-04-28 | 2003-09-02 | Samsung Electronics Co., Ltd. | System and method for automatically creating and updating a mobile station configuration database in a wireless network |
US6654797B1 (en) | 2000-05-25 | 2003-11-25 | International Business Machines Corporation | Apparatus and a methods for server configuration using a removable storage device |
US20020012329A1 (en) | 2000-06-02 | 2002-01-31 | Timothy Atkinson | Communications apparatus interface and method for discovery of remote devices |
JP3756137B2 (en) | 2000-06-09 | 2006-03-15 | 株式会社トミー | toy |
FI111208B (en) | 2000-06-30 | 2003-06-13 | Nokia Corp | Arrangement of data encryption in a wireless telecommunication system |
US7219332B2 (en) | 2000-07-07 | 2007-05-15 | Microsoft Corporation | Configuring software components(merge) with transformation component using configurable and non-configurable data elements |
US7103661B2 (en) | 2000-07-12 | 2006-09-05 | John Raymond Klein | Auto configuration of portable computers for use in wireless local area networks |
KR100471053B1 (en) | 2000-08-04 | 2005-03-07 | 삼성전자주식회사 | Computer and method for controlling the same |
US6928301B2 (en) | 2000-08-11 | 2005-08-09 | Novatel Wireless, Inc. | Distributed architecture wireless RF modem |
US7207059B1 (en) | 2000-08-16 | 2007-04-17 | Hewlett-Packard Development Company, L.P. | Wireless communication system utilizing antenna dongle |
US7181012B2 (en) * | 2000-09-11 | 2007-02-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Secured map messages for telecommunications networks |
US6738027B1 (en) | 2000-10-17 | 2004-05-18 | Sun Microsystems, Inc. | Method and apparatus for configuration using a portable electronic configuration device |
US7171475B2 (en) | 2000-12-01 | 2007-01-30 | Microsoft Corporation | Peer networking host framework and hosting API |
US6667906B2 (en) | 2001-01-08 | 2003-12-23 | Azalea Microelectronics Corporation | Integrated circuit having an EEPROM and flash EPROM using a memory cell with source-side programming |
US6934853B2 (en) | 2001-01-18 | 2005-08-23 | International Business Machines Corporation | Method, system and program for sharing the ability to set configuration parameters in a network environment |
US6693651B2 (en) * | 2001-02-07 | 2004-02-17 | International Business Machines Corporation | Customer self service iconic interface for resource search results display and selection |
US6934389B2 (en) * | 2001-03-02 | 2005-08-23 | Ati International Srl | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus |
JP2002318788A (en) | 2001-04-20 | 2002-10-31 | Matsushita Electric Works Ltd | Network terminal |
US6754725B1 (en) | 2001-05-07 | 2004-06-22 | Cypress Semiconductor Corp. | USB peripheral containing its own device driver |
US20020178295A1 (en) | 2001-05-23 | 2002-11-28 | Joseph Buczek | Distributed gateways for remote management of USB-compatible devices |
US6658538B2 (en) | 2001-06-21 | 2003-12-02 | International Business Machines Corporation | Non-uniform memory access (NUMA) data processing system having a page table including node-specific data storage and coherency control |
US6842460B1 (en) | 2001-06-27 | 2005-01-11 | Nokia Corporation | Ad hoc network discovery menu |
US8266451B2 (en) | 2001-08-31 | 2012-09-11 | Gemalto Sa | Voice activated smart card |
US7194263B2 (en) | 2001-09-17 | 2007-03-20 | Microsoft Corporation | System and method for concurrent operation of a wireless device in two disjoint wireless networks |
US7493363B2 (en) | 2001-09-19 | 2009-02-17 | Microsoft Corporation | Peer-to-peer group management and method for maintaining peer-to-peer graphs |
JP2003198568A (en) | 2001-10-16 | 2003-07-11 | Sony Corp | Transmitting/receiving apparatus, transmitting/receiving method and transmitting/receiving system |
US6806879B2 (en) | 2001-10-17 | 2004-10-19 | Avid Technology, Inc. | Manipulation of motion data in an animation editing system |
US7321784B2 (en) | 2001-10-24 | 2008-01-22 | Texas Instruments Incorporated | Method for physically updating configuration information for devices in a wireless network |
US7103773B2 (en) | 2001-10-26 | 2006-09-05 | Hewlett-Packard Development Company, L.P. | Message exchange in an information technology network |
JP3612528B2 (en) | 2001-10-29 | 2005-01-19 | Necインフロンティア株式会社 | Parameter setting system |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
KR100450080B1 (en) | 2001-11-13 | 2004-10-06 | (주)지에스텔레텍 | Portable storage medium based on Universal Serial Bus standard and Control Method therefor |
CN100363895C (en) | 2001-12-05 | 2008-01-23 | 微软公司 | Configuration and management system for movable and imbedded equipment |
US6885585B2 (en) | 2001-12-20 | 2005-04-26 | Saifun Semiconductors Ltd. | NROM NOR array |
AU2002327271A1 (en) | 2001-12-29 | 2003-07-15 | Tai Guen Enterprise Co., Ltd | A portable data conversion processor with standard data port |
US6687799B2 (en) | 2002-01-31 | 2004-02-03 | Hewlett-Packard Development Company, L.P. | Expedited memory dumping and reloading of computer processors |
US6801756B1 (en) | 2002-02-08 | 2004-10-05 | Networks Associates Technology, Inc. | Method and system for dynamic evaluation of a wireless network with a portable computing device |
US7451222B2 (en) | 2002-02-13 | 2008-11-11 | Gateway Inc. | Client-centered WEP settings on a LAN |
US20030158842A1 (en) | 2002-02-21 | 2003-08-21 | Eliezer Levy | Adaptive acceleration of retrieval queries |
CN1307522C (en) | 2002-03-06 | 2007-03-28 | 弗里科姆技术公司 | Monitoring and data exchange method of an external storage medium unit |
JP2003271482A (en) * | 2002-03-14 | 2003-09-26 | Osaka Gas Co Ltd | Information communication terminal setting method |
US7165154B2 (en) | 2002-03-18 | 2007-01-16 | Net Integration Technologies Inc. | System and method for data backup |
JP2003271694A (en) | 2002-03-18 | 2003-09-26 | Fujitsu Ltd | Simulation method and device for verifying logic circuit including processor and error detecting program for verifying logic circuit |
US7188365B2 (en) * | 2002-04-04 | 2007-03-06 | At&T Corp. | Method and system for securely scanning network traffic |
US7269730B2 (en) * | 2002-04-18 | 2007-09-11 | Nokia Corporation | Method and apparatus for providing peer authentication for an internet key exchange |
EP1355485A1 (en) | 2002-04-18 | 2003-10-22 | Deutsche Thomson-Brandt Gmbh | Method for generating a user interface on a HAVi device for the control of a Non-HAVi device |
US7116943B2 (en) | 2002-04-22 | 2006-10-03 | Cognio, Inc. | System and method for classifying signals occuring in a frequency band |
JP3748106B2 (en) | 2002-04-25 | 2006-02-22 | ソニー株式会社 | COMMUNICATION SYSTEM, INFORMATION PROCESSING DEVICE AND METHOD, RECORDING MEDIUM, AND PROGRAM |
US7551628B2 (en) | 2002-05-03 | 2009-06-23 | Hewlett-Packard Development Company, L.P. | Wireless dongle with computing capability for equipment control and method of operation thereof |
JP2004021581A (en) | 2002-06-17 | 2004-01-22 | Tai Guen Enterprise Co Ltd | Guide device and guide method for flash memory system |
US20050193103A1 (en) | 2002-06-18 | 2005-09-01 | John Drabik | Method and apparatus for automatic configuration and management of a virtual private network |
KR100597734B1 (en) | 2002-06-25 | 2006-07-07 | 삼성전자주식회사 | Memorydrive and method of controlling the same |
US6990656B2 (en) | 2002-06-27 | 2006-01-24 | Microsoft Corporation | Dynamic metabase store |
JP4695816B2 (en) | 2002-06-28 | 2011-06-08 | 富士通株式会社 | Electronic equipment |
US6738834B1 (en) | 2002-07-15 | 2004-05-18 | Cypress Microsystems | System for reconfiguring a peripheral device using configuration residing on the peripheral device by electronically simulating a physical disconnection and reconnection to a host device |
JP2004096146A (en) * | 2002-08-29 | 2004-03-25 | Sony Corp | Communication apparatus, communication control method and program, and recording medium |
US7395435B2 (en) | 2002-09-20 | 2008-07-01 | Atmel Corporation | Secure memory device for smart cards |
US7562393B2 (en) | 2002-10-21 | 2009-07-14 | Alcatel-Lucent Usa Inc. | Mobility access gateway |
GB2395613B (en) | 2002-11-21 | 2006-09-06 | Hewlett Packard Co | Memory tag,read/write device and method of operating a memory tag |
US7478248B2 (en) | 2002-11-27 | 2009-01-13 | M-Systems Flash Disk Pioneers, Ltd. | Apparatus and method for securing data on a portable storage device |
US6998871B2 (en) | 2002-11-29 | 2006-02-14 | Sigmatel, Inc. | Configurable integrated circuit for use in a multi-function handheld device |
US7099881B2 (en) | 2002-12-06 | 2006-08-29 | Stmicroelectronics, Inc. | Method for increasing average storage capacity in a bit-mapped tree-based storage engine by using remappable prefix representations and a run-length encoding scheme that defines multi-length fields to compactly store IP prefixes |
US7596625B2 (en) | 2003-01-27 | 2009-09-29 | Microsoft Corporation | Peer-to-peer grouping interfaces and methods |
US7340611B2 (en) | 2003-01-28 | 2008-03-04 | Microsoft Corporation | Template-driven XML digital signature |
US20040162076A1 (en) | 2003-02-14 | 2004-08-19 | Atul Chowdry | System and method for simplified secure universal access and control of remote networked electronic resources for the purposes of assigning and coordinationg complex electronic tasks |
WO2004095758A2 (en) | 2003-04-22 | 2004-11-04 | Cognio, Inc. | Signal classification methods for scanning receiver and other applications |
US6922734B2 (en) | 2003-05-25 | 2005-07-26 | M-Systems Flash Disk Pioneers Ltd. | Non-volatile storage device with contactless interface |
US7533184B2 (en) | 2003-06-13 | 2009-05-12 | Microsoft Corporation | Peer-to-peer name resolution wire protocol and message format data structure for use therein |
JP2005045557A (en) | 2003-07-22 | 2005-02-17 | Sony Corp | Communication device |
WO2005010730A2 (en) | 2003-07-24 | 2005-02-03 | Idea Place Corporation | Mobile memory device with integrated applications and online services |
US6976253B1 (en) | 2003-07-30 | 2005-12-13 | Microsoft Corporation | Method and apparatus for configuring a mobile device |
US7463378B2 (en) | 2003-08-21 | 2008-12-09 | Hewlett-Packard Development Company, L.P. | Visitor safe wireless printer access point |
JP2005085047A (en) * | 2003-09-09 | 2005-03-31 | Victor Co Of Japan Ltd | Network-setting device and computer program |
US7103874B2 (en) | 2003-10-23 | 2006-09-05 | Microsoft Corporation | Model-based management of computer systems and distributed applications |
US7213766B2 (en) | 2003-11-17 | 2007-05-08 | Dpd Patent Trust Ltd | Multi-interface compact personal token apparatus and methods of use |
US20050118977A1 (en) | 2003-12-02 | 2005-06-02 | Drogi Serge F. | Method, apparatus, and systems for digital radio communication systems |
US20050119936A1 (en) | 2003-12-02 | 2005-06-02 | Robert Buchanan | Sponsored media content |
US20050198221A1 (en) | 2004-01-07 | 2005-09-08 | Microsoft Corporation | Configuring an ad hoc wireless network using a portable media device |
US20050149732A1 (en) | 2004-01-07 | 2005-07-07 | Microsoft Corporation | Use of static Diffie-Hellman key with IPSec for authentication |
US7769995B2 (en) | 2004-01-07 | 2010-08-03 | Microsoft Corporation | System and method for providing secure network access |
US7657612B2 (en) | 2004-01-07 | 2010-02-02 | Microsoft Corporation | XML schema for network device configuration |
US20050198233A1 (en) | 2004-01-07 | 2005-09-08 | Microsoft Corporation | Configuring network settings of thin client devices using portable storage media |
US7653020B2 (en) | 2004-01-28 | 2010-01-26 | Harris Corporation | Wireless ultra wideband network having interference mitigation and related methods |
US7177957B2 (en) | 2004-03-11 | 2007-02-13 | Dell Products L.P. | System and method for configuring information handling system networked peripherals |
US20060013160A1 (en) | 2004-07-19 | 2006-01-19 | Haartsen Jacobus C | Peer connectivity in ad-hoc communications systems |
CN100576804C (en) | 2004-07-30 | 2009-12-30 | 微软公司 | Be used to provide the system and method for secure network access |
US8578063B2 (en) | 2004-08-20 | 2013-11-05 | Mitsubishi Kagaku Media Co., Ltd. | Self-labeling digital storage unit |
US20060069819A1 (en) | 2004-09-28 | 2006-03-30 | Microsoft Corporation | Universal serial bus device |
US7747797B2 (en) | 2004-09-28 | 2010-06-29 | Microsoft Corporation | Mass storage device with near field communications |
US7710587B2 (en) | 2004-10-18 | 2010-05-04 | Microsoft Corporation | Method and system for configuring an electronic device |
US7826833B2 (en) | 2005-02-17 | 2010-11-02 | Madhavan P G | Channel assay for thin client device wireless provisioning |
US7616588B2 (en) | 2005-03-31 | 2009-11-10 | Microsoft Corporation | Simplified creation and termination of an ad hoc wireless network with internet connection sharing |
US20060279412A1 (en) | 2005-06-13 | 2006-12-14 | Holland Joshua H | System for using RFID tags as data storage devices |
US7455218B2 (en) | 2005-06-20 | 2008-11-25 | Microsoft Corproation | Rich object model for diverse Auto-ID tags |
-
2004
- 2004-03-23 US US10/806,772 patent/US20050149732A1/en not_active Abandoned
- 2004-03-23 US US10/806,369 patent/US7546357B2/en active Active
- 2004-12-22 ZA ZA200410331A patent/ZA200410331B/en unknown
-
2005
- 2005-01-07 CN CNA2005100040546A patent/CN1761256A/en active Pending
-
2009
- 2009-04-13 US US12/422,750 patent/US7930374B2/en active Active
-
2011
- 2011-04-18 US US13/088,943 patent/US8145735B2/en not_active Expired - Lifetime
Patent Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933504A (en) * | 1995-05-18 | 1999-08-03 | Certicom Corp. | Strengthened public key protocol |
US6563928B1 (en) * | 1995-05-18 | 2003-05-13 | Certicom Corp. | Strengthened public key protocol |
US6078667A (en) * | 1996-10-10 | 2000-06-20 | Certicom Corp. | Generating unique and unpredictable values |
US6178507B1 (en) * | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
US20010014153A1 (en) * | 1997-10-14 | 2001-08-16 | Johnson Donald B. | Key validation scheme |
US6195433B1 (en) * | 1998-05-08 | 2001-02-27 | Certicom Corp. | Private key validity and validation |
US6052720A (en) * | 1998-05-14 | 2000-04-18 | Sun Microsystems, Inc. | Generic schema for storing configuration information on a server computer |
US6449642B2 (en) * | 1998-09-15 | 2002-09-10 | Microsoft Corporation | Method and system for integrating a client computer into a computer network |
US6148354A (en) * | 1999-04-05 | 2000-11-14 | M-Systems Flash Disk Pioneers Ltd. | Architecture for a universal serial bus-based PC flash disk |
US20020087868A1 (en) * | 2000-08-31 | 2002-07-04 | King James E. | Configuring processing units |
US6526264B2 (en) * | 2000-11-03 | 2003-02-25 | Cognio, Inc. | Wideband multi-protocol wireless radio transceiver system |
US20020090085A1 (en) * | 2000-12-27 | 2002-07-11 | Vanstone Scott A. | Method of public key generation |
US20020152384A1 (en) * | 2001-04-12 | 2002-10-17 | Microsoft Corporation | Methods and systems for unilateral authentication of messages |
US20020152380A1 (en) * | 2001-04-12 | 2002-10-17 | Microsoft Corporation | Methods and systems for unilateral authentication of messages |
US6654841B2 (en) * | 2001-05-03 | 2003-11-25 | Power Quotient International Company, Inc. | USB interface flash memory card reader with a built-in flash memory |
US20030031188A1 (en) * | 2001-08-08 | 2003-02-13 | Kabushiki Kaisha Toshiba. | Method of providing appropriate configuration information for communication application programs |
US20030101247A1 (en) * | 2001-11-07 | 2003-05-29 | Microsoft Corporation | Method and system for configuring a computer for real-time communication |
US6687492B1 (en) * | 2002-03-01 | 2004-02-03 | Cognio, Inc. | System and method for antenna diversity using joint maximal ratio combining |
US6785520B2 (en) * | 2002-03-01 | 2004-08-31 | Cognio, Inc. | System and method for antenna diversity using equal power joint maximal ratio combining |
US6714605B2 (en) * | 2002-04-22 | 2004-03-30 | Cognio, Inc. | System and method for real-time spectrum analysis in a communication device |
US6728517B2 (en) * | 2002-04-22 | 2004-04-27 | Cognio, Inc. | Multiple-input multiple-output radio transceiver |
US6850735B2 (en) * | 2002-04-22 | 2005-02-01 | Cognio, Inc. | System and method for signal classiciation of signals in a frequency band |
US20030217126A1 (en) * | 2002-05-14 | 2003-11-20 | Polcha Andrew J. | System and method for automatically configuring remote computer |
US20030225971A1 (en) * | 2002-05-29 | 2003-12-04 | Yuji Oishi | USB storage device and program |
US20040002943A1 (en) * | 2002-06-28 | 2004-01-01 | Merrill John Wickens Lamb | Systems and methods for application delivery and configuration management of mobile devices |
US20040010429A1 (en) * | 2002-07-12 | 2004-01-15 | Microsoft Corporation | Deployment of configuration information |
US6700450B2 (en) * | 2002-07-29 | 2004-03-02 | Cognio, Inc. | Voltage-controlled oscillator with an automatic amplitude control circuit |
US20040024875A1 (en) * | 2002-07-30 | 2004-02-05 | Microsoft Corporation | Schema-based services for identity-based access to device data |
US20040038592A1 (en) * | 2002-08-21 | 2004-02-26 | Fu-I Yang | USB flash drive |
US7013331B2 (en) * | 2002-12-20 | 2006-03-14 | Nokia, Inc. | Automated bulk configuration of network devices |
US20040221298A1 (en) * | 2003-05-02 | 2004-11-04 | Microsoft Corporation | Network device drivers using a communication transport |
Cited By (123)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11294618B2 (en) | 2003-07-28 | 2022-04-05 | Sonos, Inc. | Media player system |
US11625221B2 (en) | 2003-07-28 | 2023-04-11 | Sonos, Inc | Synchronizing playback by media playback devices |
US11301207B1 (en) | 2003-07-28 | 2022-04-12 | Sonos, Inc. | Playback device |
US10949163B2 (en) | 2003-07-28 | 2021-03-16 | Sonos, Inc. | Playback device |
US11650784B2 (en) | 2003-07-28 | 2023-05-16 | Sonos, Inc. | Adjusting volume levels |
US11080001B2 (en) | 2003-07-28 | 2021-08-03 | Sonos, Inc. | Concurrent transmission and playback of audio information |
US11106425B2 (en) | 2003-07-28 | 2021-08-31 | Sonos, Inc. | Synchronizing operations among a plurality of independently clocked digital data processing devices |
US11106424B2 (en) | 2003-07-28 | 2021-08-31 | Sonos, Inc. | Synchronizing operations among a plurality of independently clocked digital data processing devices |
US11132170B2 (en) | 2003-07-28 | 2021-09-28 | Sonos, Inc. | Adjusting volume levels |
US11635935B2 (en) | 2003-07-28 | 2023-04-25 | Sonos, Inc. | Adjusting volume levels |
US10963215B2 (en) | 2003-07-28 | 2021-03-30 | Sonos, Inc. | Media playback device and system |
US10970034B2 (en) | 2003-07-28 | 2021-04-06 | Sonos, Inc. | Audio distributor selection |
US11200025B2 (en) | 2003-07-28 | 2021-12-14 | Sonos, Inc. | Playback device |
US11550539B2 (en) | 2003-07-28 | 2023-01-10 | Sonos, Inc. | Playback device |
US11550536B2 (en) | 2003-07-28 | 2023-01-10 | Sonos, Inc. | Adjusting volume levels |
US11556305B2 (en) | 2003-07-28 | 2023-01-17 | Sonos, Inc. | Synchronizing playback by media playback devices |
US8161139B2 (en) * | 2003-10-03 | 2012-04-17 | Rockstar Bidco, LP | Method and apparatus for intelligent management of a network element |
US20100217854A1 (en) * | 2003-10-03 | 2010-08-26 | Ramesh Durairaj | Method and Apparatus for Intelligent Management of a Network Element |
US8145735B2 (en) | 2004-01-07 | 2012-03-27 | Microsoft Corporation | Configuring network settings using portable storage media |
US20110196946A1 (en) * | 2004-01-07 | 2011-08-11 | Microsoft Corporation | Configuring network settings using portable storage media |
US11907610B2 (en) | 2004-04-01 | 2024-02-20 | Sonos, Inc. | Guess access to a media playback system |
US11467799B2 (en) | 2004-04-01 | 2022-10-11 | Sonos, Inc. | Guest access to a media playback system |
US10983750B2 (en) | 2004-04-01 | 2021-04-20 | Sonos, Inc. | Guest access to a media playback system |
US11456928B2 (en) | 2004-06-05 | 2022-09-27 | Sonos, Inc. | Playback device connection |
US10979310B2 (en) | 2004-06-05 | 2021-04-13 | Sonos, Inc. | Playback device connection |
US10965545B2 (en) | 2004-06-05 | 2021-03-30 | Sonos, Inc. | Playback device connection |
US11025509B2 (en) | 2004-06-05 | 2021-06-01 | Sonos, Inc. | Playback device connection |
US11909588B2 (en) | 2004-06-05 | 2024-02-20 | Sonos, Inc. | Wireless device connection |
US11894975B2 (en) | 2004-06-05 | 2024-02-06 | Sonos, Inc. | Playback device connection |
US7765341B2 (en) | 2004-09-28 | 2010-07-27 | Microsoft Corporation | Universal serial bus device including a USB connector and a transmitter |
US20060069840A1 (en) * | 2004-09-28 | 2006-03-30 | Microsoft Corporation | Universal serial bus device |
US20060069819A1 (en) * | 2004-09-28 | 2006-03-30 | Microsoft Corporation | Universal serial bus device |
US20060069814A1 (en) * | 2004-09-28 | 2006-03-30 | Abraham Dalen M | Mass storage device with near field communications |
US7747797B2 (en) | 2004-09-28 | 2010-06-29 | Microsoft Corporation | Mass storage device with near field communications |
US20060084411A1 (en) * | 2004-10-14 | 2006-04-20 | Dell Products L.P. | Wireless infrastructure device for providing security in a wireless network |
US7710587B2 (en) * | 2004-10-18 | 2010-05-04 | Microsoft Corporation | Method and system for configuring an electronic device |
US20060082817A1 (en) * | 2004-10-18 | 2006-04-20 | Microsoft Corporation | Method and system for configuring an electronic device |
US7511848B2 (en) * | 2004-10-18 | 2009-03-31 | Microsoft Corporation | Method and system for configuring an electronic device |
US20060101456A1 (en) * | 2004-10-18 | 2006-05-11 | Microsoft Corporation | Method and system for configuring an electronic device |
US7774437B2 (en) | 2004-10-18 | 2010-08-10 | Microsoft Corporation | Configurable multi-connector storage device |
US20100054715A1 (en) * | 2004-10-25 | 2010-03-04 | Apple Inc. | Image scaling arrangement |
US7881564B2 (en) * | 2004-10-25 | 2011-02-01 | Apple Inc. | Image scaling arrangement |
US9124474B2 (en) * | 2004-11-30 | 2015-09-01 | At&T Intellectual Property Ii, L.P. | Technique for automated MAC address cloning |
US20100274917A1 (en) * | 2004-11-30 | 2010-10-28 | Ali Cherchali | Technique for Automated MAC Address Cloning |
US20060171537A1 (en) * | 2005-01-21 | 2006-08-03 | Cisco Technology, Inc. | Wireless network credential provisioning |
US7555783B2 (en) * | 2005-01-21 | 2009-06-30 | Cisco Technology, Inc. | Wireless network credential provisioning |
WO2006078430A3 (en) * | 2005-01-21 | 2007-03-01 | Cisco Tech Inc | Wireless network credential provisioning |
US20060236409A1 (en) * | 2005-02-18 | 2006-10-19 | Microsoft Corporation | Volatile portable memory |
US7735145B2 (en) | 2005-02-18 | 2010-06-08 | Microsoft Corporation | Portable secure media with timed erasure |
US7543023B2 (en) | 2005-03-15 | 2009-06-02 | Microsoft Corporation | Service support framework for peer to peer applications |
US20060224748A1 (en) * | 2005-03-15 | 2006-10-05 | Microsoft Corporation | Service support framework for peer to peer applications |
US20090083449A1 (en) * | 2005-06-17 | 2009-03-26 | Governing Dynamics, Llc | Synchronization for Wireless Devices |
US20070061485A1 (en) * | 2005-09-15 | 2007-03-15 | Microsoft Corporation | Network address selection |
US7594031B2 (en) | 2005-09-15 | 2009-09-22 | Microsoft Corporation | Network address selection |
US20070066119A1 (en) * | 2005-09-21 | 2007-03-22 | Tsung-Chu Wu | Memory device with serial AT attachment |
US10536336B2 (en) | 2005-10-19 | 2020-01-14 | Apple Inc. | Remotely configured media device |
US20070168553A1 (en) * | 2005-12-29 | 2007-07-19 | Microsoft Corporation | Ad hoc wireless network create/join user experience |
US7802088B2 (en) * | 2005-12-29 | 2010-09-21 | Microsoft Corporation | Ad hoc wireless network create/join user experience |
US20070255945A1 (en) * | 2006-04-28 | 2007-11-01 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US7926092B2 (en) | 2006-04-28 | 2011-04-12 | Canon Kabushiki Kaisha | Facilitating the delivery of security credentials to a network device |
US11385858B2 (en) | 2006-09-12 | 2022-07-12 | Sonos, Inc. | Predefined multi-channel listening environment |
US10966025B2 (en) | 2006-09-12 | 2021-03-30 | Sonos, Inc. | Playback device pairing |
US10848885B2 (en) | 2006-09-12 | 2020-11-24 | Sonos, Inc. | Zone scene management |
US11540050B2 (en) | 2006-09-12 | 2022-12-27 | Sonos, Inc. | Playback device pairing |
US11082770B2 (en) | 2006-09-12 | 2021-08-03 | Sonos, Inc. | Multi-channel pairing in a media system |
US10897679B2 (en) | 2006-09-12 | 2021-01-19 | Sonos, Inc. | Zone scene management |
US11388532B2 (en) | 2006-09-12 | 2022-07-12 | Sonos, Inc. | Zone scene activation |
US20080130530A1 (en) * | 2006-12-04 | 2008-06-05 | Avraham Gabay | Method and apparatus for creating and connecting to an ad hoc wireless cell |
US9060325B2 (en) * | 2006-12-04 | 2015-06-16 | Intel Corporation | Method and apparatus for creating and connecting to an ad hoc wireless cell |
US8281038B2 (en) | 2007-03-19 | 2012-10-02 | Fujitsu Limited | Thin client terminal, operation program and method thereof, and thin client system |
US20090276524A1 (en) * | 2007-03-19 | 2009-11-05 | Fujitsu Limited | Thin client terminal, operation program and method thereof, and thin client system |
US8214885B2 (en) | 2007-05-07 | 2012-07-03 | Mocana Corporation | Managing network components using USB keys |
WO2008137926A3 (en) * | 2007-05-07 | 2008-12-31 | Mocana Corp | Managing network components using usb keys |
AU2008248385B2 (en) * | 2007-05-07 | 2012-03-22 | Mocana Corporation | Managing network components using USB keys |
WO2008137926A2 (en) | 2007-05-07 | 2008-11-13 | Mocana Corporation | Managing network components using usb keys |
CN101730987B (en) * | 2007-05-07 | 2014-04-09 | 莫克纳公司 | Managing network components using USB keys |
US20080281953A1 (en) * | 2007-05-07 | 2008-11-13 | Mocana Corporation | Managing network components using USB keys |
US20080313085A1 (en) * | 2007-06-14 | 2008-12-18 | Motorola, Inc. | System and method to share a guest version of rights between devices |
EP2068495A1 (en) * | 2007-12-05 | 2009-06-10 | Hirschmann Automation and Control Gmbh | Offline configuration of switches |
US8775793B2 (en) * | 2008-02-20 | 2014-07-08 | Telefonaktiebolaget L M Ericsson (Publ) | Flexible node identity for telecom nodes |
US20100318881A1 (en) * | 2008-02-20 | 2010-12-16 | Andreas Limber | Flexible Node Identity for Telecom Nodes |
US8458448B2 (en) | 2008-03-31 | 2013-06-04 | British Telecommunications Public Limited Company | Method of installing a wireless network |
US20110019826A1 (en) * | 2008-03-31 | 2011-01-27 | Browning Kenneth J | Method of installing a wireless network |
WO2009122146A1 (en) * | 2008-03-31 | 2009-10-08 | British Telecommunications Public Limited Company | Method of installing a wireless network |
US8244840B2 (en) | 2008-04-10 | 2012-08-14 | Eastman Kodak Company | Simplified walk-up enablement of inter-based, personalized access to retail imaging devices and services |
US8095631B2 (en) * | 2008-04-10 | 2012-01-10 | Eastman Kodak Company | Simplified walk-up enablement of internet-based, personalized access to retail imaging devices and services |
WO2009126202A1 (en) * | 2008-04-10 | 2009-10-15 | Eastman Kodak Company | Remotely accessing a photokiosk using configuration and account data read from a portable storage device |
US20090257804A1 (en) * | 2008-04-10 | 2009-10-15 | Manico Joseph A | Simplified walk-up enablement of internet-based, personalized access to retail imaging devices and services |
US20090281676A1 (en) * | 2008-04-16 | 2009-11-12 | Beavis Russell H | Systems, Apparatus, and Methods for the Management and Control of Remotely Controlled Devices |
US10895898B2 (en) * | 2008-04-16 | 2021-01-19 | Deka Products Limited Partnership | Management of remotely controlled devices |
US20100054156A1 (en) * | 2008-08-29 | 2010-03-04 | Dehaan Michael Paul | Systems and methods for software provisioning in multiple network configuration environment |
US9021470B2 (en) * | 2008-08-29 | 2015-04-28 | Red Hat, Inc. | Software provisioning in multiple network configuration environment |
US20110125885A1 (en) * | 2009-11-23 | 2011-05-26 | Samsung Electronics Co., Ltd. | Method for setting network environment and storage device applying the same |
EP2326045A1 (en) * | 2009-11-23 | 2011-05-25 | Samsung Electronics Co., Ltd. | Method for setting network environment and storage device applying the same |
US10275147B2 (en) * | 2009-12-02 | 2019-04-30 | Samsung Electronics Co., Ltd. | Mobile device and control method thereof |
US10863557B2 (en) | 2009-12-02 | 2020-12-08 | Samsung Electronics Co., Ltd. | Mobile device and control method thereof |
US20110289229A1 (en) * | 2010-05-05 | 2011-11-24 | BridgeCo Inc. | Methods and systems for wi-fi setup and configuration |
US11429343B2 (en) | 2011-01-25 | 2022-08-30 | Sonos, Inc. | Stereo playback configuration and control |
US11265652B2 (en) | 2011-01-25 | 2022-03-01 | Sonos, Inc. | Playback device pairing |
US11758327B2 (en) | 2011-01-25 | 2023-09-12 | Sonos, Inc. | Playback device pairing |
US9301326B2 (en) * | 2012-04-12 | 2016-03-29 | Ricoh Company, Ltd. | Wireless communication system, wireless communication method, and wireless terminal |
US20130272224A1 (en) * | 2012-04-12 | 2013-10-17 | Ricoh Company, Ltd. | Wireless communication system, wireless communication method, and wireless terminal |
US20150071052A1 (en) * | 2013-09-09 | 2015-03-12 | Qualcomm Innovation Center, Inc. | Reconfiguring a headless wireless device |
CN104518910A (en) * | 2013-10-07 | 2015-04-15 | 施耐德电器工业公司 | Device for configuration of ethernet equipment and method for configuration of ethernet equipment using such a device |
US11133985B2 (en) | 2015-02-02 | 2021-09-28 | A9.Com, Inc. | Systems and methods for intuitive home networking |
US10833927B2 (en) | 2015-02-02 | 2020-11-10 | A9.Com, Inc. | Systems and methods for intuitive home networking |
US9882774B2 (en) | 2015-02-02 | 2018-01-30 | Eero Inc. | Systems and methods for intuitive home networking |
US10594552B2 (en) | 2015-02-02 | 2020-03-17 | A9.Com, Inc. | Systems and methods for intuitive home networking |
US9736019B2 (en) * | 2015-05-14 | 2017-08-15 | Eero Inc. | Methods for dynamic router configuration in a mesh network |
US11075802B2 (en) | 2015-05-14 | 2021-07-27 | A9.Com, Inc. | Methods for dynamic router configuration in a mesh network |
US11403062B2 (en) | 2015-06-11 | 2022-08-02 | Sonos, Inc. | Multiple groupings in a playback system |
US10296355B2 (en) * | 2015-06-30 | 2019-05-21 | Skidata Ag | Method for the configuration of electronic devices, in particular for the configuration of components of an access control system |
US10223296B2 (en) * | 2015-09-28 | 2019-03-05 | Orange | Method of transferring configuration information for a connected object |
US20170200144A1 (en) * | 2016-01-13 | 2017-07-13 | Paypal, Inc. | Dongle device for automatic pairing of payment terminal to mobile computing device |
US10922674B2 (en) | 2016-01-13 | 2021-02-16 | Paypal, Inc. | Dongle device for automatic pairing of payment terminal to mobile computing device |
US10552821B2 (en) * | 2016-01-13 | 2020-02-04 | Paypal, Inc. | Dongle device for automatic pairing of payment terminal to mobile computing device |
US11297558B2 (en) | 2016-09-27 | 2022-04-05 | A9.Com. Inc. | Methods for network configuration sharing |
US10609626B2 (en) | 2016-09-27 | 2020-03-31 | A9.Com. Inc. | Methods for network configuration sharing |
US11481182B2 (en) | 2016-10-17 | 2022-10-25 | Sonos, Inc. | Room association based on name |
CN111277549A (en) * | 2018-12-05 | 2020-06-12 | 杭州希戈科技有限公司 | Security service method and system adopting block chain |
US11363449B2 (en) * | 2019-07-12 | 2022-06-14 | Apple Inc. | Cellular wireless service preferences transfer |
US11706609B2 (en) | 2019-07-12 | 2023-07-18 | Apple Inc. | Cellular wireless service preferences transfer |
CN111865564A (en) * | 2020-07-29 | 2020-10-30 | 北京浪潮数据技术有限公司 | IPSec communication establishing method and system |
Also Published As
Publication number | Publication date |
---|---|
US7930374B2 (en) | 2011-04-19 |
US7546357B2 (en) | 2009-06-09 |
US20090254639A1 (en) | 2009-10-08 |
US20050149732A1 (en) | 2005-07-07 |
US8145735B2 (en) | 2012-03-27 |
CN1761256A (en) | 2006-04-19 |
ZA200410331B (en) | 2009-04-29 |
US20110196946A1 (en) | 2011-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7546357B2 (en) | Configuring network settings using portable storage media | |
US7657612B2 (en) | XML schema for network device configuration | |
EP1553746B1 (en) | Configuring network settings of thin client devices using portable storage media | |
EP2355570B1 (en) | Automated network device configuration and network deployment | |
US7310664B1 (en) | Unified, configurable, adaptive, network architecture | |
US8700743B2 (en) | Network configuration device | |
US8261341B2 (en) | UPnP VPN gateway configuration service | |
US7565418B2 (en) | Network device setup utility | |
US7421266B1 (en) | Installation and configuration process for wireless network | |
US20070268516A1 (en) | Automated policy-based network device configuration and network deployment | |
US7363358B2 (en) | Transporting a WAN configuration from a PC to a residential gateway | |
Wadeley | Fedora 20 Networking Guide | |
Bathrick | DSL Forum TR-064 LAN-Side DSL CPE Configuration May 2004 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MANCHESTER, SCOTT;NICK, BENJAMIN;FREEMAN, TREVOR W.;AND OTHERS;REEL/FRAME:015125/0735 Effective date: 20040322 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: ROVI TECHNOLOGIES CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034539/0676 Effective date: 20141027 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: HPS INVESTMENT PARTNERS, LLC, AS COLLATERAL AGENT, Free format text: SECURITY INTEREST;ASSIGNORS:ROVI SOLUTIONS CORPORATION;ROVI TECHNOLOGIES CORPORATION;ROVI GUIDES, INC.;AND OTHERS;REEL/FRAME:051143/0468 Effective date: 20191122 Owner name: HPS INVESTMENT PARTNERS, LLC, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:ROVI SOLUTIONS CORPORATION;ROVI TECHNOLOGIES CORPORATION;ROVI GUIDES, INC.;AND OTHERS;REEL/FRAME:051143/0468 Effective date: 20191122 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ROVI SOLUTIONS CORPORATION;ROVI TECHNOLOGIES CORPORATION;ROVI GUIDES, INC.;AND OTHERS;REEL/FRAME:051110/0006 Effective date: 20191122 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ROVI SOLUTIONS CORPORATION;ROVI TECHNOLOGIES CORPORATION;ROVI GUIDES, INC.;AND OTHERS;REEL/FRAME:051110/0006 Effective date: 20191122 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA Free format text: SECURITY INTEREST;ASSIGNORS:ROVI SOLUTIONS CORPORATION;ROVI TECHNOLOGIES CORPORATION;ROVI GUIDES, INC.;AND OTHERS;REEL/FRAME:053468/0001 Effective date: 20200601 |
|
AS | Assignment |
Owner name: ROVI GUIDES, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:HPS INVESTMENT PARTNERS, LLC;REEL/FRAME:053458/0749 Effective date: 20200601 Owner name: TIVO SOLUTIONS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:HPS INVESTMENT PARTNERS, LLC;REEL/FRAME:053458/0749 Effective date: 20200601 Owner name: ROVI SOLUTIONS CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:HPS INVESTMENT PARTNERS, LLC;REEL/FRAME:053458/0749 Effective date: 20200601 Owner name: ROVI TECHNOLOGIES CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:HPS INVESTMENT PARTNERS, LLC;REEL/FRAME:053458/0749 Effective date: 20200601 Owner name: VEVEO, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:HPS INVESTMENT PARTNERS, LLC;REEL/FRAME:053458/0749 Effective date: 20200601 Owner name: TIVO SOLUTIONS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:053481/0790 Effective date: 20200601 Owner name: ROVI GUIDES, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:053481/0790 Effective date: 20200601 Owner name: ROVI SOLUTIONS CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:053481/0790 Effective date: 20200601 Owner name: VEVEO, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:053481/0790 Effective date: 20200601 Owner name: ROVI TECHNOLOGIES CORPORATION, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:053481/0790 Effective date: 20200601 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |